Trojan Horse

View this topic in
The Trojan Horse is a tale from the Trojan War, as told in Virgil's Latin epic poem The Aeneid, also by Dionysius, Apollodorus and Quintus of Smyrna. (Wikipedia.org)






Conferences related to Trojan Horse

Back to Top

2013 Design, Automation & Test in Europe Conference & Exhibition (DATE 2013)

DATE is the complete event for the European electronic and test community. A leading world conference and exhibition, DATE unites 2,000 professionals with approximately 60 exhibiting companies, cutting edge R&D, industrial designers and technical managers from around the world.

  • 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE 2012)

    DATE is the complete event for the European electronic system and test community. A leading world conference and exhibition, DATE unites 2,000 professionals with some 60 exhibiting companies, cutting edge R&D, industrial designers and technical managers from around the world.

  • 2011 Design, Automation & Test in Europe Conference & Exhibition (DATE 2011)

    DATE is the complete event for the European electronic system and test community. A world leading conference and exhibition, DATE unites 2,000 professionals with some 60 exhibiting companies, cutting edge R&D, industrial designers and technical managers from around the world.

  • 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010)

    All aspects of research into technologies for electronic and (embedded) systems engineering. It covers the design process, test, and tools for design automation of electronic products ranging from integrated circuits to distributed large-scale systems.

  • 2009 Design, Automation & Test in Europe Conference & Exhibition (DATE 2009)

    The Design, Automation, and Test in Europe (DATE) conference is the world's premier conference dedicated to electronics system design & test. The technical programme features: Four distinctive and integrated themes, covering all aspects of systems design and engineering. Two special days are focusing on SoC Development Strategies and Multicore Applications.

  • 2008 Design, Automation & Test in Europe Conference & Exhibition (DATE 2008)

    The 11th DATE conference and exhibition is the main European event bringing together designers and design automation users, researchers and vendors, as well as specialists in the hardware and software design, test and manufacturing of electronic circuits and systems. It puts strong emphasis on ICs/SoCs, reconfigurable hardware and embedded systems, including embedded software. The five-day event consists of a conference with plenary invited papers, regular papers, panels, hot-topic sessions, tutorials.


2013 IEEE 10th International Conference on Networking, Sensing and Control (ICNSC)

The main theme of the conference is Technology for efficient green networks . It will provide a remarkable opportunity for the academic and industrial communities to address new challenges and share solutions, and discuss future research directions.

  • 2012 9th IEEE International Conference on Networking, Sensing and Control (ICNSC)

    This conference will provide a remarkable opportunity for the academic and industrial community to address new challenges and share solutions, and discuss future research directions in the area of intelligent transportation systems and networks as well other areas of networking, sensing and control. It will feature plenary speeches, industrial panel sessions, funding agency panel sessions, interactive sessions, and invited/special sessions. Contributions are expected from academia, industry, and government agencies.

  • 2011 IEEE International Conference on Networking, Sensing and Control (ICNSC)

    The main theme of the conference is Next Generation Infrastructures . Infrastructures are the backbone of the economy and society. Especially the network bound infrastructures operated by public utilities and network industries provide essential services that are enabling for almost every economic and social activity. The crucial role of the infrastructure networks for energy and water supply, transportation of people and goods, and provision of telecommunication and information services.

  • 2010 International Conference on Networking, Sensing and Control (ICNSC)

    Provide a remarkable opportunity for the academic and industrial community to address new challenges and share solutions, and discuss future research directions.

  • 2009 International Conference on Networking, Sensing and Control (ICNSC)

    The main theme of the conference is advanced technologies for safety and functional maintenance. The real challenge is to obtain advanced control technology for safety and management technology and to construct an information system to share information on safetytechnology and on investigated accidents.

  • 2008 IEEE International Conference on Networking, Sensing and Control (ICNSC)

    Provide a remarkable opportunity for the academic and industrial community to address new challenges and share solutions, and discuss future research directions.

  • 2007 IEEE International Conference on Networking, Sensing and Control (ICNSC)

  • 2006 IEEE International Conference on Networking, Sensing and Control (ICNSC)


2013 International Conference on Machine Learning and Cybernetics (ICMLC)

Statistical Machine Learning, Intelligent & fuzzy control, Pattern Recognition , Ensemble method, Evolutionary computation, Fuzzy & rough set, Data & web mining , Intelligent Business Computing , Biometrics , Bioinformatics , Information retrieval, Cybersecurity, Web intelligence and technology, Semantics & ontology engineering, Social Networks & Ubiquitous Intelligence, Multicriteria decision making, Soft Computing, Intelligent Systems, Speech, Image & Video Processing, Decision Support System

  • 2012 International Conference on Machine Learning and Cybernetics (ICMLC)

    Adaptive systems, Pattern Recognition, Biometrics, Inductive learning, Evolutionary computation, Bioinformatics, Data mining, Information retrieval, Intelligent agent, Financial engineering, Rough Set, Applications.

  • 2011 International Conference on Machine Learning and Cybernetics (ICMLC)

    Adaptive systems, Neural net and support vector machine, Business intelligence, Hybrid and nonlinear system, Biometrics, Fuzzy set theory, fuzzy control and system, Bioinformatics, Knowledge management, Data and web mining, Information retrieval, Intelligent agent, Intelligent and knowledge based system, Financial engineering, Rough and fuzzy rough set, Inductive learning, Networking and information security, Geoinformatics, Evolutionary computation, Pattern Recognition, Ensemble method, Logistics.

  • 2010 International Conference on Machine Learning and Cybernetics (ICMLC)

    Adaptive systems, Neural net and support vector machine, Business intelligence, Hybrid and nonlinear system, Biometrics, Fuzzy set theory, fuzzy control and system, Bioinformatics, Knowledge management, Data and web mining, Information retrieval, Intelligent agent, Intelligent and knowledge based system, Financial engineering, Rough and fuzzy rough set, Inductive learning, Networking and information security, Geoinformatics, Evolutionary computation, Pattern Recognition, Ensemble method, Logistics, Informat


2011 3rd International Conference on Multimedia Information Networking and Security (MINES)

Multimedia computing and intelligence Information networking and communication Service science and Intelligence Multimedia information security Communication and network security

  • 2010 International Conference on Multimedia Information Networking and Security (MINES)

    To provide a platform for worldwide researchers and engineers to exchange the latest research results on multimedia information services, with the focuses on: Multimedia computing and intelligence; Information networking and communication; Service science and Intelligence; Multimedia information security; Communication and network security

  • 2009 International Conference on Multimedia Information Networking and Security (MINES 2009)

    The conference aims to provide a platform for worldwide researchers and engineers to exchange the latest research results on multimedia information services, with the focuses on networking and security.


2011 3rd International Conference on Networking and Digital Society (ICNDS)

The aim of ICNDS 2011 is to provide a platform for researchers and engineers to present their research results and development activities in Networking and Digital Society. It also provides opportunities for the delegates to exchange new ideas and application experiences, to find global partners for future collaboration.


More Conferences

Periodicals related to Trojan Horse

Back to Top

Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...




Xplore Articles related to Trojan Horse

Back to Top

Containing the Ultimate Trojan Horse

Michael Franz IEEE Security & Privacy, 2007

Security vulnerabilities in software systems are a rapidly growing threat in an increasingly networked world. Unfortunately many systems are now so complex that high-assurance auditing for errors would be prohibitively expensive. In this article, author explains about how some of the potential risks could be contained through security management at the base of the software stack, rather than inside application ...


Spam hits instant messaging

L. D. Paulson Computer, 2004

Spam, a controversial issue for e-mail, has begun to hit instant messaging (IM) in large quantities, creating a phenomenon called spim. Some industry observers say the crackdown on spam by Internet service providers, lawmakers, and users may have caused marketers to turn to IM. Spim has many of spam's characteristics, including deceptive subject lines and fake sender names. And like ...


The Integrity Lock Architecture and Its Application to Message Systems: Reducing Covert Channels

Catherine Meadows 1987 IEEE Symposium on Security and Privacy, 1987

The integrity lock architecture provides a means of constructing a secure database management system with a relatively small amount of trusted code, using a trusted filter which verifies the integrity of security labels on data from an untrusted DBMS by computing cryptographic checksums. However, since the trusted filter can only check whether or not an individual item of data has ...


Hardware Trojan Horses in Cryptographic IP Cores

Shivam Bhasin; Jean-Luc Danger; Sylvain Guilley; Xuan Thuy Ngo; Laurent Sauvage 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013

Detecting hardware trojans is a difficult task in general. In this article we study hardware trojan horses insertion and detection in cryptographic intellectual property (IP) blocks. The context is that of a fabless design house that sells IP blocks as GDSII hard macros, and wants to check that final products have not been infected by trojans during the foundry stage. ...


Exploring Multiple Execution Paths for Malware Analysis

Andreas Moser; Christopher Kruegel; Engin Kirda 2007 IEEE Symposium on Security and Privacy (SP '07), 2007

Malicious code (or Malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and purpose of a given Malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be able to develop effective detection techniques and removal tools. Currently, Malware ...


More Xplore Articles

Educational Resources on Trojan Horse

Back to Top

eLearning

Containing the Ultimate Trojan Horse

Michael Franz IEEE Security & Privacy, 2007

Security vulnerabilities in software systems are a rapidly growing threat in an increasingly networked world. Unfortunately many systems are now so complex that high-assurance auditing for errors would be prohibitively expensive. In this article, author explains about how some of the potential risks could be contained through security management at the base of the software stack, rather than inside application ...


Spam hits instant messaging

L. D. Paulson Computer, 2004

Spam, a controversial issue for e-mail, has begun to hit instant messaging (IM) in large quantities, creating a phenomenon called spim. Some industry observers say the crackdown on spam by Internet service providers, lawmakers, and users may have caused marketers to turn to IM. Spim has many of spam's characteristics, including deceptive subject lines and fake sender names. And like ...


The Integrity Lock Architecture and Its Application to Message Systems: Reducing Covert Channels

Catherine Meadows 1987 IEEE Symposium on Security and Privacy, 1987

The integrity lock architecture provides a means of constructing a secure database management system with a relatively small amount of trusted code, using a trusted filter which verifies the integrity of security labels on data from an untrusted DBMS by computing cryptographic checksums. However, since the trusted filter can only check whether or not an individual item of data has ...


Hardware Trojan Horses in Cryptographic IP Cores

Shivam Bhasin; Jean-Luc Danger; Sylvain Guilley; Xuan Thuy Ngo; Laurent Sauvage 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013

Detecting hardware trojans is a difficult task in general. In this article we study hardware trojan horses insertion and detection in cryptographic intellectual property (IP) blocks. The context is that of a fabless design house that sells IP blocks as GDSII hard macros, and wants to check that final products have not been infected by trojans during the foundry stage. ...


Exploring Multiple Execution Paths for Malware Analysis

Andreas Moser; Christopher Kruegel; Engin Kirda 2007 IEEE Symposium on Security and Privacy (SP '07), 2007

Malicious code (or Malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and purpose of a given Malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be able to develop effective detection techniques and removal tools. Currently, Malware ...


More eLearning Resources

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Trojan Horse"

IEEE-USA E-Books

No IEEE-USA E-Books are currently tagged "Trojan Horse"



Standards related to Trojan Horse

Back to Top

No standards are currently tagged "Trojan Horse"


Jobs related to Trojan Horse

Back to Top