Trojan Horse

View this topic in
The Trojan Horse is a tale from the Trojan War, as told in Virgil's Latin epic poem The Aeneid, also by Dionysius, Apollodorus and Quintus of Smyrna. (Wikipedia.org)






Conferences related to Trojan Horse

Back to Top

2013 Design, Automation & Test in Europe Conference & Exhibition (DATE 2013)

DATE is the complete event for the European electronic and test community. A leading world conference and exhibition, DATE unites 2,000 professionals with approximately 60 exhibiting companies, cutting edge R&D, industrial designers and technical managers from around the world.

  • 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE 2012)

    DATE is the complete event for the European electronic system and test community. A leading world conference and exhibition, DATE unites 2,000 professionals with some 60 exhibiting companies, cutting edge R&D, industrial designers and technical managers from around the world.

  • 2011 Design, Automation & Test in Europe Conference & Exhibition (DATE 2011)

    DATE is the complete event for the European electronic system and test community. A world leading conference and exhibition, DATE unites 2,000 professionals with some 60 exhibiting companies, cutting edge R&D, industrial designers and technical managers from around the world.

  • 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010)

    All aspects of research into technologies for electronic and (embedded) systems engineering. It covers the design process, test, and tools for design automation of electronic products ranging from integrated circuits to distributed large-scale systems.

  • 2009 Design, Automation & Test in Europe Conference & Exhibition (DATE 2009)

    The Design, Automation, and Test in Europe (DATE) conference is the world's premier conference dedicated to electronics system design & test. The technical programme features: Four distinctive and integrated themes, covering all aspects of systems design and engineering. Two special days are focusing on SoC Development Strategies and Multicore Applications.

  • 2008 Design, Automation & Test in Europe Conference & Exhibition (DATE 2008)

    The 11th DATE conference and exhibition is the main European event bringing together designers and design automation users, researchers and vendors, as well as specialists in the hardware and software design, test and manufacturing of electronic circuits and systems. It puts strong emphasis on ICs/SoCs, reconfigurable hardware and embedded systems, including embedded software. The five-day event consists of a conference with plenary invited papers, regular papers, panels, hot-topic sessions, tutorials.


2013 IEEE 10th International Conference on Networking, Sensing and Control (ICNSC)

The main theme of the conference is Technology for efficient green networks . It will provide a remarkable opportunity for the academic and industrial communities to address new challenges and share solutions, and discuss future research directions.

  • 2012 9th IEEE International Conference on Networking, Sensing and Control (ICNSC)

    This conference will provide a remarkable opportunity for the academic and industrial community to address new challenges and share solutions, and discuss future research directions in the area of intelligent transportation systems and networks as well other areas of networking, sensing and control. It will feature plenary speeches, industrial panel sessions, funding agency panel sessions, interactive sessions, and invited/special sessions. Contributions are expected from academia, industry, and government agencies.

  • 2011 IEEE International Conference on Networking, Sensing and Control (ICNSC)

    The main theme of the conference is Next Generation Infrastructures . Infrastructures are the backbone of the economy and society. Especially the network bound infrastructures operated by public utilities and network industries provide essential services that are enabling for almost every economic and social activity. The crucial role of the infrastructure networks for energy and water supply, transportation of people and goods, and provision of telecommunication and information services.

  • 2010 International Conference on Networking, Sensing and Control (ICNSC)

    Provide a remarkable opportunity for the academic and industrial community to address new challenges and share solutions, and discuss future research directions.

  • 2009 International Conference on Networking, Sensing and Control (ICNSC)

    The main theme of the conference is advanced technologies for safety and functional maintenance. The real challenge is to obtain advanced control technology for safety and management technology and to construct an information system to share information on safetytechnology and on investigated accidents.

  • 2008 IEEE International Conference on Networking, Sensing and Control (ICNSC)

    Provide a remarkable opportunity for the academic and industrial community to address new challenges and share solutions, and discuss future research directions.

  • 2007 IEEE International Conference on Networking, Sensing and Control (ICNSC)

  • 2006 IEEE International Conference on Networking, Sensing and Control (ICNSC)


2013 International Conference on Machine Learning and Cybernetics (ICMLC)

Statistical Machine Learning, Intelligent & fuzzy control, Pattern Recognition , Ensemble method, Evolutionary computation, Fuzzy & rough set, Data & web mining , Intelligent Business Computing , Biometrics , Bioinformatics , Information retrieval, Cybersecurity, Web intelligence and technology, Semantics & ontology engineering, Social Networks & Ubiquitous Intelligence, Multicriteria decision making, Soft Computing, Intelligent Systems, Speech, Image & Video Processing, Decision Support System

  • 2012 International Conference on Machine Learning and Cybernetics (ICMLC)

    Adaptive systems, Pattern Recognition, Biometrics, Inductive learning, Evolutionary computation, Bioinformatics, Data mining, Information retrieval, Intelligent agent, Financial engineering, Rough Set, Applications.

  • 2011 International Conference on Machine Learning and Cybernetics (ICMLC)

    Adaptive systems, Neural net and support vector machine, Business intelligence, Hybrid and nonlinear system, Biometrics, Fuzzy set theory, fuzzy control and system, Bioinformatics, Knowledge management, Data and web mining, Information retrieval, Intelligent agent, Intelligent and knowledge based system, Financial engineering, Rough and fuzzy rough set, Inductive learning, Networking and information security, Geoinformatics, Evolutionary computation, Pattern Recognition, Ensemble method, Logistics.

  • 2010 International Conference on Machine Learning and Cybernetics (ICMLC)

    Adaptive systems, Neural net and support vector machine, Business intelligence, Hybrid and nonlinear system, Biometrics, Fuzzy set theory, fuzzy control and system, Bioinformatics, Knowledge management, Data and web mining, Information retrieval, Intelligent agent, Intelligent and knowledge based system, Financial engineering, Rough and fuzzy rough set, Inductive learning, Networking and information security, Geoinformatics, Evolutionary computation, Pattern Recognition, Ensemble method, Logistics, Informat


2011 3rd International Conference on Multimedia Information Networking and Security (MINES)

Multimedia computing and intelligence Information networking and communication Service science and Intelligence Multimedia information security Communication and network security

  • 2010 International Conference on Multimedia Information Networking and Security (MINES)

    To provide a platform for worldwide researchers and engineers to exchange the latest research results on multimedia information services, with the focuses on: Multimedia computing and intelligence; Information networking and communication; Service science and Intelligence; Multimedia information security; Communication and network security

  • 2009 International Conference on Multimedia Information Networking and Security (MINES 2009)

    The conference aims to provide a platform for worldwide researchers and engineers to exchange the latest research results on multimedia information services, with the focuses on networking and security.


2011 3rd International Conference on Networking and Digital Society (ICNDS)

The aim of ICNDS 2011 is to provide a platform for researchers and engineers to present their research results and development activities in Networking and Digital Society. It also provides opportunities for the delegates to exchange new ideas and application experiences, to find global partners for future collaboration.


More Conferences

Periodicals related to Trojan Horse

Back to Top

Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...




Xplore Articles related to Trojan Horse

Back to Top

Hardware Trojan horse detection using gate-level characterization

Miodrag Potkonjak; Ani Nahapetian; Michael Nelson; Tammara Massey 2009 46th ACM/IEEE Design Automation Conference, 2009

Hardware Trojan horses (HTHs) are the malicious altering of hardware specification or implementation in such a way that its functionality is altered under a set of conditions defined by the attacker. There are numerous HTHs sources including untrusted foundries, synthesis tools and libraries, testing and verification tools, and configuration scripts. HTH attacks can greatly comprise security and privacy of hardware ...


Timing attacks against trusted path

J. T. Trostle Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), 1998

Presents new attacks against a user workstation's trusted path mechanism. These timing attacks can cause a user's password to leak bits. The timing attacks can then be combined with network authentication protocol brute-force attacks against the remainder of the key space to obtain the user's password. We present several countermeasures against this attack. We also define a property of user ...


Stealthy cyber attacks and impact analysis on wide-area protection of smart grid

Vivek Kumar Singh; Altay Ozen; Manimaran Govindarasu 2016 North American Power Symposium (NAPS), 2016

Smart grid is vulnerable to many cyber attacks due to legacy nature of the infrastructure coupled with increase in control and monitoring functions through cyber advancements. Remedial Action Scheme (RAS), widely used for wide area protection, provides autonomous operations through the RAS controller. Due to its dependence on the timely cooperation of multiple devices and communication network, it is highly ...


Investigating intrusion detection systems that use trails of system calls

Suhair Hafez Amer; John A. Hamilton 2008 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2008

Three intrusion detection systems that use trails of system calls have been investigated. The three techniques used to generate the pattern database have been adapted from sequence method, lookahead-pairs method and variable-length- with-overlap-relationship method. Testing against Trojan horse and denial of service attacks was analyzed. None of the systems is capable of defeating the system-call denial-of-service-attack. Modification is necessary to ...


Detecting Trojan horses based on system behavior using machine learning method

Yu-Feng Liu; Li-Wei Zhang; Jian Liang; Sheng Qu; Zhi-Qiang Ni 2010 International Conference on Machine Learning and Cybernetics, 2010

The Research of detection malware using machine learning method attracts much attention recent years. However, most of research focused on code analysis which is signature-based or analysis of system call sequence in Linux environment. Obviously, all methods have their strengths and weaknesses. In this paper, we concentrate on detection Trojan horse by operation system information in Windows environment using data ...


More Xplore Articles

Educational Resources on Trojan Horse

Back to Top

eLearning

Hardware Trojan horse detection using gate-level characterization

Miodrag Potkonjak; Ani Nahapetian; Michael Nelson; Tammara Massey 2009 46th ACM/IEEE Design Automation Conference, 2009

Hardware Trojan horses (HTHs) are the malicious altering of hardware specification or implementation in such a way that its functionality is altered under a set of conditions defined by the attacker. There are numerous HTHs sources including untrusted foundries, synthesis tools and libraries, testing and verification tools, and configuration scripts. HTH attacks can greatly comprise security and privacy of hardware ...


Timing attacks against trusted path

J. T. Trostle Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), 1998

Presents new attacks against a user workstation's trusted path mechanism. These timing attacks can cause a user's password to leak bits. The timing attacks can then be combined with network authentication protocol brute-force attacks against the remainder of the key space to obtain the user's password. We present several countermeasures against this attack. We also define a property of user ...


Stealthy cyber attacks and impact analysis on wide-area protection of smart grid

Vivek Kumar Singh; Altay Ozen; Manimaran Govindarasu 2016 North American Power Symposium (NAPS), 2016

Smart grid is vulnerable to many cyber attacks due to legacy nature of the infrastructure coupled with increase in control and monitoring functions through cyber advancements. Remedial Action Scheme (RAS), widely used for wide area protection, provides autonomous operations through the RAS controller. Due to its dependence on the timely cooperation of multiple devices and communication network, it is highly ...


Investigating intrusion detection systems that use trails of system calls

Suhair Hafez Amer; John A. Hamilton 2008 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2008

Three intrusion detection systems that use trails of system calls have been investigated. The three techniques used to generate the pattern database have been adapted from sequence method, lookahead-pairs method and variable-length- with-overlap-relationship method. Testing against Trojan horse and denial of service attacks was analyzed. None of the systems is capable of defeating the system-call denial-of-service-attack. Modification is necessary to ...


Detecting Trojan horses based on system behavior using machine learning method

Yu-Feng Liu; Li-Wei Zhang; Jian Liang; Sheng Qu; Zhi-Qiang Ni 2010 International Conference on Machine Learning and Cybernetics, 2010

The Research of detection malware using machine learning method attracts much attention recent years. However, most of research focused on code analysis which is signature-based or analysis of system call sequence in Linux environment. Obviously, all methods have their strengths and weaknesses. In this paper, we concentrate on detection Trojan horse by operation system information in Windows environment using data ...


More eLearning Resources

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Trojan Horse"

IEEE-USA E-Books

No IEEE-USA E-Books are currently tagged "Trojan Horse"



Standards related to Trojan Horse

Back to Top

No standards are currently tagged "Trojan Horse"


Jobs related to Trojan Horse

Back to Top