Hardening (computing)

Known as: Hardening 
In computing, hardening is usually the process of securing a system by reducing its surface of vulnerability, which is larger when a system performs… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
Although graphite is known as one of the most chemically inert materials, we have found that graphene, a single atomic plane of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
A gate-level radiation hardening technique for cost-effective reduction of the soft error failure rate in combinational logic… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 6
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In defending one’s network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Most web applications contain security vulnerabilities. The simple and natural ways of creating a web application are prone to… (More)
  • figure 1
Is this relevant?
Highly Cited
2005
Highly Cited
2005
With the success of wireless technologies in consumer electronics, standard wireless technologies are envisioned for the… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
A radiation hardening technique for combinational logic circuits is described. The key idea is to exploit the asymmetric logical… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • table I
Is this relevant?
Highly Cited
2003
Highly Cited
2003
In-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in… (More)
  • figure 1
  • figure 2
  • figure 4
  • table 1
  • table 2
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We present a novel approach to improving the security of passwords. In our approach, the legitimate user’s typing patterns (e.g… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
1999
Highly Cited
1999
A new constitutive model is introduced which is formulated in the framework of classical theory of plasticity. In the model the… (More)
Is this relevant?
Highly Cited
1999
Highly Cited
1999
We show that standard silicon nitride cantilevers can be used for tapping mode atomic force microscopy (AFM) in air, provided… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?