• CASca

  • Referenced in 1 article [sw13472]
  • scalable stream cipher. This paper presents a scalable stream cipher based on Cellular Automata ... secured against certain kind of fault attacks. The scalability provides different security level for different...
  • Flowfence

  • Referenced in 1 article [sw38852]
  • attack. Conventional defenses for these attacks are not scalable, are slow to react or introduce...
  • MoTE-ECC

  • Referenced in 2 articles [sw09247]
  • Mote-ECC: energy-scalable elliptic curve cryptography for wireless sensor networks Wireless sensor networks (WSNs ... susceptible to a wide range of malicious attacks, which has stimulated a body of research ... introduce MoTE-ECC, a highly optimized yet scalable ECC library for Memsic’s MICAz motes ... harden MoTE-ECC against side-channel attacks (e.g. simple power analysis) and introduce a highly...
  • AntBot

  • Referenced in 3 articles [sw21755]
  • understand the strategy space from the attacker’s perspective. Against this backdrop, we analyze ... perspectives of reachability, resilience to pollution, and scalability. To evaluate the effectiveness of AntBot against ... offers us a tool to evaluate the attacker’s strategy in the cyber space without...
  • MixTrain

  • Referenced in 1 article [sw31370]
  • MixTrain: Scalable Training of Verifiably Robust Neural Networks. Making neural networks robust against adversarial inputs ... arms race between new defenses and attacks. The most promising defenses, adversarially robust training...
  • ERAN

  • Referenced in 1 article [sw40545]
  • tuned to provide best precision and scalability (see recommended configuration settings at the bottom). ERAN ... layers against input perturbations (e.g., L∞-norm attacks, geometric transformations, vector field deformations...
  • Ditto

  • Referenced in 1 article [sw41838]
  • that robustness to data and model poisoning attacks and fairness, measured as the uniformity ... fairness and robustness benefits, and develop a scalable solver for it. Theoretically, we analyze...
  • BotTokenizer

  • Referenced in 1 article [sw23890]
  • channels to connect to the attackers and control compromised clients. Due to its large popularity ... high detection efficiency and accuracy, their scalability and automatization still need to be improved...
  • Opa

  • Referenced in 1 article [sw22713]
  • open-source programming language for developing scalable web applications. It can be used for both ... injections and cross-site scripting attacks.[4] The language was first officially presented...
  • JSNice

  • Referenced in 1 article [sw37814]
  • example of our approach, we built a scalable prediction engine called JSNice for solving ... work opens up new possibilities for attacking a wide range of difficult problems...
  • M4RI

  • Referenced in 20 articles [sw00534]
  • M4RI is a library for fast arithmetic with...
  • Maple

  • Referenced in 5373 articles [sw00545]
  • The result of over 30 years of cutting...
  • Mathematica

  • Referenced in 6355 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • Matlab

  • Referenced in 13544 articles [sw00558]
  • MATLAB® is a high-level language and interactive...
  • MiniSat

  • Referenced in 566 articles [sw00577]
  • An extensible SAT-solver. MiniSat is a minimalistic...
  • R

  • Referenced in 9969 articles [sw00771]
  • R is a language and environment for statistical...
  • SCIP

  • Referenced in 542 articles [sw01091]
  • SCIP is currently one of the fastest non...
  • GridSec

  • Referenced in 4 articles [sw01927]
  • GridSec: Trusted grid computing with security binding and...
  • HMQV

  • Referenced in 80 articles [sw02714]
  • The MQV protocol of Law, Menezes, Qu, Solinas...
  • BRITE

  • Referenced in 34 articles [sw03098]
  • BRITE: A Flexible Generator of Internet Topologies. Abstract...