Results 11 to 20 of about 59,306 (232)
This paper considers the problem of estimating the parameters of a frequency-hopping signal under non-cooperative conditions. To make the estimation of different parameters independently of each other, a compressed domain frequency-hopping signal ...
Weipeng Zhu +3 more
doaj +1 more source
Working Mode Recognition of Non-Specific Radar Based on ResNet-SVM Learning Framework
Mode recognition is a basic task to interpret the behavior of multi-functional radar. The existing methods need to train complex and huge neural networks to improve the recognition ability, and it is difficult to deal with the mismatch between the ...
Jifei Pan, Jingwei Xiong, Yihong Zhuo
doaj +1 more source
Experimental evaluation of two software countermeasures against fault attacks [PDF]
Injection of transient faults can be used as a way to attack embedded systems. On embedded processors such as microcontrollers, several studies showed that such a transient fault injection with glitches or electromagnetic pulses could corrupt either the ...
Dehbaoui, Amine +4 more
core +5 more sources
As used in modern practice, judicial decisions, and literature, the term “countermeasures” covers the main part of the classical subject of “reprisals,” to which the first monographs of international law were devoted in the 14th century (B. de Sassoferrato and G. de Legnano).
Christian Krieg +4 more
+7 more sources
Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack: A Pledge for Formal Methods in the Field of Implementation Security [PDF]
In our paper at PROOFS 2013, we formally studied a few known countermeasures to protect CRT-RSA against the BellCoRe fault injection attack. However, we left Vigilant's countermeasure and its alleged repaired version by Coron et al.
Guilley, Sylvain, Rauzy, Pablo
core +3 more sources
Formal verification of a software countermeasure against instruction skip attacks [PDF]
Fault attacks against embedded circuits enabled to define many new attack paths against secure circuits. Every attack path relies on a specific fault model which defines the type of faults that the attacker can perform.
Encrenaz, Emmanuelle +3 more
core +7 more sources
Risk and Business Goal Based Security Requirement and Countermeasure Prioritization [PDF]
Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement “good-enough security” but need to be able to justify their security investment plans ...
A. Herrmann +7 more
core +2 more sources
Bacillus anthracis is a potent biowarfare agent, able to be highly lethal. The bacteria dwell in the soil of certain regions, as natural flora.
Aleksandra Nakonieczna +5 more
doaj +1 more source
Performance Evaluation of Deception Against Synthetic Aperture Radar Based on Multifeature Fusion
Deception is an effective means of jamming against synthetic aperture radar (SAR). The performance of deceptive jamming is affected by the accuracy of parameter measurement and the applied antijamming methods of SAR.
Tian Tian +6 more
doaj +1 more source
Ubiquitous computing is leading to ubiquitous sensing. Sensor components such as motion, proximity, and biometric sensors are increasingly common features in everyday objects. However, the presence and full capabilities of these components are often not clear to users. Sensor-enhanced objects have the ability to perceive without being perceived.
openaire +2 more sources

