Results 11 to 20 of about 70,576 (258)

Parameter Estimation Algorithm of Frequency-Hopping Signal in Compressed Domain Based on Improved Atomic Dictionary

open access: yesSensors, 2023
This paper considers the problem of estimating the parameters of a frequency-hopping signal under non-cooperative conditions. To make the estimation of different parameters independently of each other, a compressed domain frequency-hopping signal ...
Weipeng Zhu   +3 more
doaj   +1 more source

Working Mode Recognition of Non-Specific Radar Based on ResNet-SVM Learning Framework

open access: yesSensors, 2023
Mode recognition is a basic task to interpret the behavior of multi-functional radar. The existing methods need to train complex and huge neural networks to improve the recognition ability, and it is difficult to deal with the mismatch between the ...
Jifei Pan, Jingwei Xiong, Yihong Zhuo
doaj   +1 more source

Countermeasures

open access: yes, 2013
As used in modern practice, judicial decisions, and literature, the term “countermeasures” covers the main part of the classical subject of “reprisals,” to which the first monographs of international law were devoted in the 14th century (B. de Sassoferrato and G. de Legnano).
Keijo Haataja   +3 more
  +7 more sources

Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack: A Pledge for Formal Methods in the Field of Implementation Security [PDF]

open access: yes, 2014
In our paper at PROOFS 2013, we formally studied a few known countermeasures to protect CRT-RSA against the BellCoRe fault injection attack. However, we left Vigilant's countermeasure and its alleged repaired version by Coron et al.
Guilley, Sylvain, Rauzy, Pablo
core   +3 more sources

How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems [PDF]

open access: yes, 2015
Recently security researchers have started to look into automated generation of attack trees from socio-technical system models. The obvious next step in this trend of automated risk analysis is automating the selection of security controls to treat the ...
Gadyatskaya, Olga
core   +12 more sources

Hardware architecture implemented on FPGA for protecting cryptographic keys against side-channel attacks [PDF]

open access: yes, 2016
This paper presents a new hardware architecture designed for protecting the key of cryptographic algorithms against attacks by side-channel analysis (SCA).
Cantó Navarro, Enrique   +2 more
core   +2 more sources

Formal verification of a software countermeasure against instruction skip attacks [PDF]

open access: yes, 2013
Fault attacks against embedded circuits enabled to define many new attack paths against secure circuits. Every attack path relies on a specific fault model which defines the type of faults that the attacker can perform.
Encrenaz, Emmanuelle   +3 more
core   +7 more sources

Three Novel Bacteriophages, J5a, F16Ba, and z1a, Specific for Bacillus anthracis, Define a New Clade of Historical Wbeta Phage Relatives

open access: yesViruses, 2022
Bacillus anthracis is a potent biowarfare agent, able to be highly lethal. The bacteria dwell in the soil of certain regions, as natural flora.
Aleksandra Nakonieczna   +5 more
doaj   +1 more source

Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking [PDF]

open access: yes, 2013
Content-Centric Networking (CCN) is an emerging networking paradigm being considered as a possible replacement for the current IP-based host-centric Internet infrastructure. In CCN, named content becomes a first-class entity.
Compagno, Alberto   +3 more
core   +3 more sources

Performance Evaluation of Deception Against Synthetic Aperture Radar Based on Multifeature Fusion

open access: yesIEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 2021
Deception is an effective means of jamming against synthetic aperture radar (SAR). The performance of deceptive jamming is affected by the accuracy of parameter measurement and the applied antijamming methods of SAR.
Tian Tian   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy