Results 31 to 40 of about 308,277 (215)

Communication behavior recognition using CNN-based signal analysis [PDF]

open access: yesPeerJ Computer Science
This article explores the technology of recognizing non-cooperative communication behavior, with a specific emphasis on analyzing communication station signals.
Hao Meng   +5 more
doaj   +2 more sources

Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer [PDF]

open access: yes, 2008
A portable civilian GPS spoofer is implemented on a digital signal processor and used to characterize spoofing effects and develop defenses against civilian spoofing.
Humphreys, Todd E.   +4 more
core   +1 more source

Unidimensional ACGAN Applied to Link Establishment Behaviors Recognition of a Short-Wave Radio Station

open access: yesSensors, 2020
It is difficult to obtain many labeled Link Establishment (LE) behavior signals sent by non-cooperative short-wave radio stations. We propose a novel unidimensional Auxiliary Classifier Generative Adversarial Network (ACGAN) to get more signals and then ...
Zilong Wu, Hong Chen, Yingke Lei
doaj   +1 more source

A Biocompatible Liquid Pillar[n]arene-Based Drug Reservoir for Topical Drug Delivery

open access: yesPharmaceutics, 2022
Advanced external preparations that possess a sustained-release effect and integrate few irritant elements are urgently needed to satisfy the special requirements of topical administration in the clinic.
Yahan Zhang   +8 more
doaj   +1 more source

Risk and Business Goal Based Security Requirement and Countermeasure Prioritization [PDF]

open access: yes, 2012
Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement “good-enough security” but need to be able to justify their security investment plans ...
A. Herrmann   +7 more
core   +2 more sources

Transferrin receptor targeting segment T7 containing peptide gene delivery vectors for efficient transfection of brain tumor cells

open access: yesDrug Delivery, 2022
Successful gene therapy for brain tumors are often limited by two important factors, the existence of blood brain barrier (BBB) and inefficient transfection of brain tumor cells.
Ziyao Kang   +9 more
doaj   +1 more source

Integrating security and usability into the requirements and design process [PDF]

open access: yes, 2006
According to Ross Anderson, 'Many systems fail because their designers protect the wrong things or protect the right things in the wrong way'. Surveys also show that security incidents in industry are rising, which highlights the difficulty of designing ...
Flechais, I, Mascolo, C, Sasse, MA
core   +1 more source

Neuron tau-targeting biomimetic nanoparticles for curcumin delivery to delay progression of Alzheimer’s disease

open access: yesJournal of Nanobiotechnology, 2020
Background Although many therapeutic strategies for Alzheimer’s disease (AD) have been explored, these strategies are seldom used in the clinic. Therefore, AD therapeutic research is still urgently needed.
Chunhong Gao   +9 more
doaj   +1 more source

Efficient design and evaluation of countermeasures against fault attacks using formal verification [PDF]

open access: yes, 2015
This paper presents a formal verification framework and tool that evaluates the robustness of software countermeasures against fault-injection attacks. By modeling reference assembly code and its protected variant as automata, the framework can generate ...
AG Bayrak   +9 more
core   +3 more sources

Toolbox of Countermeasures for Rural Two-Lane Curves, June 2012 [PDF]

open access: yes, 2012
The Federal Highway Administration (FHWA) estimates that 58 percent of roadway fatalities are lane departures, while 40 percent of fatalities are single-vehicle run-off-road (SVROR) crashes.

core  

Home - About - Disclaimer - Privacy