Detecting Backdoor
碩士 === 國立中山大學 === 資訊管理學系研究所 === 92 === Cyber space is like a society. Attacking events happen all the time. No matter what is in the cyber space. We need to do many things to defend our computers and network devices form attackers, for example: update patches, install anti-virus software, firewalls...
Main Authors: | Cheng-yuan Kao, 高振元 |
---|---|
Other Authors: | Chia-Mei Chen |
Format: | Others |
Language: | zh-TW |
Published: |
2004
|
Online Access: | http://ndltd.ncl.edu.tw/handle/88787972689426691766 |
Similar Items
-
Backdoor Detection based on SVM
by: Zhong-Chiang Tzeng, et al.
Published: (2005) -
Study and Detection of "Backdoors" on System Administration
by: Kuei Shei-Wen, et al. -
Backdoor Listing in China- Odds of Completion, Choice between Backdoor Listing and IPO, and Post-Backdoor Performance
by: Chin Lin, et al.
Published: (2019) -
Backdoor smoothing: Demystifying backdoor attacks on deep neural networks
by: Backes, M., et al.
Published: (2022) -
A study of detecting backdoor in real-time
by: Jian-gang Tsai, et al.
Published: (2003)