Results 41 to 50 of about 811,171 (213)

Deep learning‐assisted and combined attack: a novel side‐channel attack [PDF]

open access: yesElectronics Letters, 2018
A deep learning (DL)‐assisted and combined side‐channel attack (SCA) is exploited to disclose the secret key of an advanced encryption standard (AES) cryptographic circuit with a countermeasure. Different physical leakages of the protected AES cryptographic circuit such as power dissipation and electromagnetic (EM) emission are captured together at ...
W. Yu, J. Chen
openaire   +1 more source

Time after time – circadian clocks through the lens of oscillator theory

open access: yesFEBS Letters, EarlyView.
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo   +2 more
wiley   +1 more source

Approach of detecting low-rate DoS attack based on combined features

open access: yesTongxin xuebao, 2017
LDoS (low-rate denial of service) attack is a kind of RoQ (reduction of quality) attack which has the characteristics of low average rate and strong concealment.These characteristics pose great threats to the security of cloud computing platform and big ...
Zhi-jun WU   +3 more
doaj   +2 more sources

Weak randomness in device independent quantum key distribution and the advantage of using high dimensional entanglement

open access: yes, 2013
We show that in device independent quantum key distribution protocols the privacy of randomness is of crucial importance. For sublinear test sample sizes even the slightest guessing probability by an eavesdropper will completely compromise security.
Huber, Marcus, Pawlowski, Marcin
core   +1 more source

The newfound relationship between extrachromosomal DNAs and excised signal circles

open access: yesFEBS Letters, EarlyView.
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley   +1 more source

Sinkhole Attack Defense Strategy Integrating SPA and Jaya Algorithms in Wireless Sensor Networks

open access: yesSensors, 2023
A sinkhole attack is characterized by low difficulty to launch, high destructive power, and difficulty to detect and defend. It is a common attack mode for wireless sensor networks.
Zhijun Teng   +4 more
doaj   +1 more source

Development of protection mechanisms against DRDoS-attacks and combined DRDoS-attacks [PDF]

open access: yesVibroengineering Procedia, 2017
Distributed “denial of service” attacks based on the traffic reflection and amplification (DRDoS attacks) still are a powerful threat for computer networks. More than half of all attacks were executed by using multiple types of attacks. Development of new protection mechanisms against such attacks is one of the most important tasks in the field of ...
Yana Bekeneva, Andrey Shorov
openaire   +1 more source

In situ molecular organization and heterogeneity of the Legionella Dot/Icm T4SS

open access: yesFEBS Letters, EarlyView.
We present a nearly complete in situ model of the Legionella Dot/Icm type IV secretion system, revealing its central secretion channel and identifying new components. Using cryo‐electron tomography with AI‐based modeling, our work highlights the structure, variability, and mechanism of this complex nanomachine, advancing understanding of bacterial ...
Przemysław Dutka   +11 more
wiley   +1 more source

Network security situation evaluation method for multi-step attack

open access: yesTongxin xuebao, 2017
Aiming at analyzing the influence of multi-step attack,as well as reflecting the system’s security situation accurately and comprehensively,a network security situation evaluation method for multi-step attack was proposed.This method firstly clustered ...
Hao-pu YANG, Hui QIU, Kun WANG
doaj   +2 more sources

Impact of pine looper defoliation in Scots pine [PDF]

open access: yes, 2003
Widespread defoliation of forests caused by insects or fungi cause economic losses throughout the world. Successful outbreak management involves cost/benefit estimation and requires knowledge of potential yield losses. Currently, such knowledge is scarce.
Cedervind, Jan
core  

Home - About - Disclaimer - Privacy