Results 191 to 200 of about 4,301,094 (348)
The application of blockchain technology in data trading: a systematic review. [PDF]
Xiong W, Shao H, Ge H.
europepmc +1 more source
Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses
Steve Weingart
openalex +1 more source
This study investigates optoelectronic PUFs that improve on traditional optical and electrical PUFs. The absorber materials are randomly coated through spray coating, ligand exchange, and dynamic spin coating. Incident light generates wavelength‐dependent binary multikey and enhances security ternary keys, approaching near‐ideal inter‐ and intra ...
Hanseok Seo+6 more
wiley +1 more source
A novel and secure artificial intelligence enabled zero trust intrusion detection in industrial internet of things architecture. [PDF]
Laghari AA+7 more
europepmc +1 more source
Special Issue: Computer Security [PDF]
Giampaolo Bella, Ronaldo Menezes
openalex +1 more source
Rapid Diagnostics of Reconfigurable Intelligent Surfaces Using Space‐Time‐Coding Modulation
A fast reconfigurable‐intelligent‐surface (RIS) diagnostics method is proposed based on spatio‐temporal modulation with orthogonal codes. Theoretical analysis demonstrates a clear distinction in code channel power between normal and faulty elements. Simulations validate its feasibility under high fault ratios and varying receiving angles.
Yi Ning Zheng+7 more
wiley +1 more source
IoT security approach based random distribution of communication frequency. [PDF]
Joseph Salomon MTV+7 more
europepmc +1 more source
Safety, reliability and security of industrial computer systems
K. Kanoun, Alberto Pasquini
openalex +2 more sources
Computer Security: A Summary of Selected Federal Laws, Executive Orders, and Presidential Directives [PDF]
J. Moteff
openalex +1 more source