1
by Deza, Alfredo
Published 2024
Pragmatic AI Solutions
... your large language model (LLM) applications by addressing potential vulnerabilities. You will explore...

2
by Vamanu, Bogdan I., Gheorghe, Adrian V., Katina, Polinpapilinho F.
Published 2016
Springer International Publishing
Table of Contents: ... Assessment -- Quantitative Probability Assessment of LOC Accident -- Vulnerability Assessment in Hazardous...

3
Published 2017
Springer International Publishing
...: Information Propagation, User Behavior Modelling, Forecasting, and Vulnerability Assessment appeals...

4
by Salmani, Hassan
Published 2018
Springer International Publishing
Table of Contents: ... Vulnerabilities to Hardware Trojans at the Register Transfer Level -- Design Techniques for Hardware Trojans...

5
by Knaddison, Greg James
Published 2009
Wiley Pub.
Table of Contents: ...pt. I. Anatomy of Vulnerabilities -- Ch. 1. That Horrible Sinking Feeling -- Ch. 2. Security...

6
by Pan, Zhixin, Mishra, Prabhat
Published 2023
Springer Nature Switzerland
Table of Contents: .... Explainable Artificial Intelligence -- Part 2: Detection of Software Vulnerabilities -- Chapter 3. Malware...

7
Published 2019
Springer International Publishing
Table of Contents: ... -- Classification - Learning -- Deep Learning -- Deep Learning - Convolutional ANN -- Fuzzy - Vulnerability...

8
by Sun, Guangyu
Published 2014
Springer International Publishing
Table of Contents: ... to Explore the Memory Hierarchy for Throughput Computing -- Exploring the Vulnerability of CMPs to Soft...

9
Published 2019
Springer International Publishing
Table of Contents: ...Security Protocols for IoT -- Security in Ubiquitous Computing Environment: Vulnerabilities...

10
Published 2024
Springer Nature Switzerland
Table of Contents: ... Systems: A Systematic Literature Review -- Vulnerability Analysis - Business Case -- Information security...

11
Published 2022
Springer International Publishing
Table of Contents: ... Estimation -- A Fine-Grained Approach for Vulnerabilities Discovery using Augmented Vulnerability Signatures...

12
by Dunstone, Ted, Yager, Neil
Published 2009
Springer US
Table of Contents: ... Topics in Biometric Data Analysis -- Proof of Identity -- Covert Surveillance Systems -- Vulnerabilities...

13
Published 2017
Springer International Publishing
Table of Contents: ...Part I. Introduction -- Chapter 1.Security and Trust Vulnerabilities in Third-party IPs -- PArt...

14
by Farahmandi, Farimah, Rahman, M. Sazadur, Rajendran, Sree Ranjani, Tehranipoor, Mark
Published 2023
Springer International Publishing
Table of Contents: ... Metering -- CAD for Detecting HLS Vulnerabilities -- CAD for Counterfeit Detection and Prevention -- CAD...

15
Published 2022
Springer International Publishing
Table of Contents: ... Transition Towards Sustainability. Design, architecture, production -- (Un)earth vulnerable Chile...

16
by Lepofsky, Ron
Published 2014
Apress
... with those issues quickly and effectively. Often, security vulnerabilities are difficult to understand...

17
Published 2009
IT Governance Pub.
Table of Contents: ...; Filtering; Vulnerability management; APPENDIX A: GLOSSARY; APPENDIX B: SOCIAL NETWORKING SCREENSHOTS; ITG...

18
Published 2013
Springer Berlin Heidelberg
Table of Contents: ... vulnerability analysis under multiple contingencies -- A bilevel particle swarm optimization algorithm...

19
Published 2016
Springer International Publishing
Table of Contents: ... Building Trusted Systems: Vulnerabilities, Threats and Mitigation Techniques -- Hardware IP Watermarking...

20
Published 2022
Springer International Publishing
Table of Contents: ... Survey on the State of the Art of Vulnerability Assessment Techniques -- Comparison of Safety...