Federated machine learning: Survey, multi-level classification, desirable criteria and future directions in communication and networking systems

OA Wahab, A Mourad, H Otrok… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The communication and networking field is hungry for machine learning decision-making
solutions to replace the traditional model-driven approaches that proved to be not rich …

Software defined radio: Challenges and opportunities

T Ulversoy - IEEE Communications Surveys & Tutorials, 2010 - ieeexplore.ieee.org
Software Defined Radio (SDR) may provide flexible, upgradeable and longer lifetime radio
equipment for the military and for civilian wireless communications infrastructure. SDR may …

Singularity: Scientific containers for mobility of compute

GM Kurtzer, V Sochat, MW Bauer - PloS one, 2017 - journals.plos.org
Here we present Singularity, software developed to bring containers and reproducibility to
scientific computing. Using Singularity containers, developers can work in reproducible …

Trusted execution environment: What it is, and what it is not

M Sabt, M Achemlal… - 2015 IEEE Trustcom …, 2015 - ieeexplore.ieee.org
Nowadays, there is a trend to design complex, yet secure systems. In this context, the
Trusted Execution Environment (TEE) was designed to enrich the previously defined trusted …

seL4: Formal verification of an OS kernel

G Klein, K Elphinstone, G Heiser, J Andronick… - Proceedings of the …, 2009 - dl.acm.org
Complete formal verification is the only known way to guarantee that a system is free of
programming errors. We present our experience in performing the formal, machine-checked …

Comprehensive formal verification of an OS microkernel

G Klein, J Andronick, K Elphinstone, T Murray… - ACM Transactions on …, 2014 - dl.acm.org
We present an in-depth coverage of the comprehensive machine-checked formal verification
of seL4, a general-purpose operating system microkernel. We discuss the kernel design we …

[PDF][PDF] Cryptography and Data Security

DE Denning - 1982 - calhoun.nps.edu
Electronic computers have evolved from exiguous experimental enterprises in the 1940s to
prolific practical data processing systems in the 1980s. As we have come to rely on these …

A scalable approach to attack graph generation

X Ou, WF Boyer, MA McQueen - … of the 13th ACM conference on …, 2006 - dl.acm.org
Attack graphs are important tools for analyzing security vulnerabilities in enterprise
networks. Previous work on attack graphs has not provided an account of the scalability of …

Systems and methods for secure transaction management and electronic rights protection

KL Ginter, VH Shear, FJ Spahn, DM Van Wie - US Patent 7,120,800, 2006 - Google Patents
The present invention provides systems and methods for secure transaction management
and electronic rights protection. Electronic appliances such as computers equipped in …

Systems and methods for secure transaction management and electronic rights protection

KL Ginter, VH Shear, FJ Spahn, DM Van Wie - US Patent 7,076,652, 2006 - Google Patents
First worldwide family litigation filed litigation Critical https://patents. darts-ip. com/? family=
23532729&utm_source= google_patent&utm_medium= platform_link&utm_campaign …