-
1Academic Journal
المؤلفون: Desh Deepak Sharma
المصدر: IET Blockchain, Vol 4, Iss 4, Pp 302-314 (2024)
مصطلحات موضوعية: blockchains, contracts, encryption, interoperability, trustworthy computing, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
Relation: https://doaj.org/toc/2634-1573
-
2
المؤلفون: Colaco, Valency, Doktorand, Nadjm-Tehrani, Simin, 1958
المصدر: Proceedings of the Workshop on Artificial Intelligence Safety 2023 (SafeAI 2023) co-located with the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023) CEUR Workshop Proceedings.
مصطلحات موضوعية: Machine Learning, Formal Verification, Tree Ensembles, Composite Perturbations, Geometric Perturbations, Random Forests, Gradient Boosting Machines, Semantic Perturbations, Stability, Robustness, Trustworthy AI, Trustworthy Computing
وصف الملف: electronic
-
3Academic Journal
المؤلفون: Weilin Wu, Yixiang Chen
المصدر: IEEE Access, Vol 10, Pp 10371-10383 (2022)
مصطلحات موضوعية: Intelligent building, fire risk assessment, fire risk trustworthy classification model, Bayesian network, trustworthy computing, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
4Dissertation/ Thesis
المؤلفون: Graf, Jonathan Peter
Thesis Advisors: Electrical and Computer Engineering, Athanas, Peter M., Jones, Mark T., Patterson, Cameron D., Brown, Ezra A., Tront, Joseph G.
مصطلحات موضوعية: Field programmable gate arrays, trust, design security, design integrity, design confidentiality, trustworthy computing, game theory
وصف الملف: ETD; application/pdf
الاتاحة: http://hdl.handle.net/10919/89920
-
5
المؤلفون: Jeannette M. Wing
المصدر: Communications of the ACM. 64:64-71
مصطلحات موضوعية: Trustworthy computing, Trustworthiness, General Computer Science, Computer science, Formal methods, Computer security, computer.software_genre, computer
-
6
المؤلفون: Alexander Kott, Laurent Njilla, Sachin Shetty, Charles A. Kamhoua
المصدر: Blockchain for Distributed Systems Security
مصطلحات موضوعية: Government, System deployment, business.industry, Computer science, Survivability, Cloud computing, Computer security, computer.software_genre, Trustworthy computing, Scalability, business, Resource management (computing), Mobile device, computer, Edge computing
-
7Dissertation/ Thesis
المؤلفون: Lerner, Lee Wilmoth
Thesis Advisors: Electrical and Computer Engineering, Patterson, Cameron D., Shukla, Sandeep K., Yao, Danfeng (Daphne), Schaumont, Patrick R., Park, Jung-Min
مصطلحات موضوعية: Trustworthy Computing, Secure Computing, Autonomic Computing, Cybersecurity, Embedded Systems, Cyber-Physical Systems, Process Control Systems
وصف الملف: ETD; application/pdf
الاتاحة: http://hdl.handle.net/10919/51545
-
8Dissertation/ Thesis
المؤلفون: Petz, Adam Michael
المساهمون: Alexander, Perry, Bardas, Alex, Davidson, Drew, Gill, Andy, Kulkarni, Prasad, Witt, Emily
مصطلحات موضوعية: Computer science, attestation, computer security, distributed systems security, domain specific languages, formal verification, trustworthy computing
وصف الملف: 164 pages; application/pdf
-
9
المؤلفون: John D. Ramsdell, Paul D. Rowe, Ian D. Kretz
المصدر: PPDP
مصطلحات موضوعية: Trustworthy computing, Set (abstract data type), Adversarial system, Information retrieval, Trustworthiness, Language change, Computer science, Leverage (statistics), Adversary, Semantics
-
10
المؤلفون: Wenjing Lou, Yaxing Chen, Qinghua Zheng, Ning Zhang, Y. Thomas Hou, Wenhai Sun
المصدر: IEEE Transactions on Information Forensics and Security. 14:1830-1842
مصطلحات موضوعية: 021110 strategic, defence & security studies, Information privacy, Computer Networks and Communications, Computer science, business.industry, 0211 other engineering and technologies, Homomorphic encryption, Cryptography, Access control, Cloud computing, 02 engineering and technology, Computer security, computer.software_genre, Encryption, Trustworthy computing, Software, Overhead (computing), Safety, Risk, Reliability and Quality, business, computer
-
11
المؤلفون: Nigel Topham, Heba Salem
المصدر: ETS
Salem, H & Topham, N 2021, Trustworthy computing on untrustworthy and Trojan-infected on-chip interconnects . in Proceedings of the 26th IEEE European Test Symposium . Institute of Electrical and Electronics Engineers (IEEE), 26th IEEE European Test Symposium, Belgium, 24/05/21 . https://doi.org/10.1109/ETS50041.2021.9465416مصطلحات موضوعية: Scheme (programming language), Interconnection, Event (computing), business.industry, Computer science, Hardware Trust, Trustworthy computing, Software, Trojan, Component (UML), Design for Security, Hardware Security, System on a chip, business, computer, Computer network, computer.programming_language
وصف الملف: application/pdf
-
12
المؤلفون: Virgil D. Gligor, Miao Yu, Limin Jia
المصدر: IEEE Symposium on Security and Privacy
مصطلحات موضوعية: Trustworthy computing, Assembly language, Computer science, Programming language, Firmware, Kernel (statistics), Key (cryptography), Code (cryptography), computer.software_genre, computer, Formal verification, computer.programming_language, Domain (software engineering)
-
13
المؤلفون: Yachen Tang
مصطلحات موضوعية: Trustworthy computing, Distribution system, Computer science, Inference, Anomaly detection, Data mining, Anomaly (physics), computer.software_genre, computer
-
14
المؤلفون: Tianyu Lu, Liquan Chen, Chen Yu
المصدر: 2020 International Conference on Internet of Things and Intelligent Applications (ITIA).
مصطلحات موضوعية: 050101 languages & linguistics, business.industry, Computer science, 05 social sciences, Hash function, 02 engineering and technology, Cryptographic protocol, Telecommunications network, Trustworthy computing, Public-key cryptography, Server, 0202 electrical engineering, electronic engineering, information engineering, Direct Anonymous Attestation, 020201 artificial intelligence & image processing, 0501 psychology and cognitive sciences, business, Computer network, Anonymity
-
15
المؤلفون: Olasunkanmi Matthew Alofe, Kaniz Fatema
المصدر: Palgrave Studies in Digital Business & Enabling Technologies ISBN: 9783030546595
مصطلحات موضوعية: Computer science, business.industry, Data_MISCELLANEOUS, 020206 networking & telecommunications, Cloud computing, 02 engineering and technology, Computer security, computer.software_genre, Trustworthy computing, Trustworthiness, Data_GENERAL, 020204 information systems, 0202 electrical engineering, electronic engineering, information engineering, media_common.cataloged_instance, European union, business, computer, Reliability (statistics), media_common
وصف الملف: application/pdf
-
16Academic Journal
المؤلفون: Katzan, Jr., Harry
المصدر: International Journal of Management & Information Systems (IJMIS); Vol. 14 No. 2 (2010) ; 2157-9628 ; 1546-5748 ; 10.19030/ijmis.v14i2
مصطلحات موضوعية: Cloud computing, software architecture, software-as-a-service, platform-as-a-service, infrastructure-as-a-service, private cloud, public cloud, community cloud, hybrid cloud, privacy, trustworthy computing, security
وصف الملف: application/pdf
Relation: https://clutejournals.com/index.php/IJMIS/article/view/824/808; https://clutejournals.com/index.php/IJMIS/article/view/824
-
17
المؤلفون: Vijayakumar Varadarajan, Wathiq Mansoor
المصدر: Journal of Ambient Intelligence and Smart Environments. :1-2
مصطلحات موضوعية: Trustworthy computing, Computer science, Computer security, computer.software_genre, computer, Software
-
18
المؤلفون: Lee W. Lerner
المصدر: FPGA
مصطلحات موضوعية: Source code, Computer science, Vendor, business.industry, media_common.quotation_subject, Supply chain, 02 engineering and technology, Intellectual property, 010402 general chemistry, 021001 nanoscience & nanotechnology, 01 natural sciences, 0104 chemical sciences, Trustworthy computing, Software, Software design, 0210 nano-technology, Engineering design process, Software engineering, business, media_common
-
19
المؤلفون: Vandana Rohokale, Ramjee Prasad
المصدر: Springer Series in Wireless Technology ISBN: 9783030317027
مصطلحات موضوعية: Trustworthy computing, Open research, Risk analysis (engineering), Scope (project management), business.industry, Information and Communications Technology, Computer science, Key (cryptography), Usability, Enterprise information security architecture, business, Task (project management)
-
20
المؤلفون: Lizhe Wang, Fatos Xhafa, Wei Ren, Kim-Kwang Raymond Choo
المصدر: Security and Privacy for Big Data, Cloud Computing and Applications ISBN: 9781785617478
Security and Privacy for Big Data, Cloud Computing and Applicationsمصطلحات موضوعية: Blockchain, Social network, business.industry, Computer science, Reliability (computer networking), Internet privacy, Vulnerability, E-commerce, computer.software_genre, Trustworthy computing, Scale (social sciences), Collaboration, The Internet, business, computer