Results 31 to 40 of about 308,277 (215)
Communication behavior recognition using CNN-based signal analysis [PDF]
This article explores the technology of recognizing non-cooperative communication behavior, with a specific emphasis on analyzing communication station signals.
Hao Meng +5 more
doaj +2 more sources
Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer [PDF]
A portable civilian GPS spoofer is implemented on a digital signal processor and used to characterize spoofing effects and develop defenses against civilian spoofing.
Humphreys, Todd E. +4 more
core +1 more source
It is difficult to obtain many labeled Link Establishment (LE) behavior signals sent by non-cooperative short-wave radio stations. We propose a novel unidimensional Auxiliary Classifier Generative Adversarial Network (ACGAN) to get more signals and then ...
Zilong Wu, Hong Chen, Yingke Lei
doaj +1 more source
A Biocompatible Liquid Pillar[n]arene-Based Drug Reservoir for Topical Drug Delivery
Advanced external preparations that possess a sustained-release effect and integrate few irritant elements are urgently needed to satisfy the special requirements of topical administration in the clinic.
Yahan Zhang +8 more
doaj +1 more source
Risk and Business Goal Based Security Requirement and Countermeasure Prioritization [PDF]
Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement “good-enough security” but need to be able to justify their security investment plans ...
A. Herrmann +7 more
core +2 more sources
Successful gene therapy for brain tumors are often limited by two important factors, the existence of blood brain barrier (BBB) and inefficient transfection of brain tumor cells.
Ziyao Kang +9 more
doaj +1 more source
Integrating security and usability into the requirements and design process [PDF]
According to Ross Anderson, 'Many systems fail because their designers protect the wrong things or protect the right things in the wrong way'. Surveys also show that security incidents in industry are rising, which highlights the difficulty of designing ...
Flechais, I, Mascolo, C, Sasse, MA
core +1 more source
Background Although many therapeutic strategies for Alzheimer’s disease (AD) have been explored, these strategies are seldom used in the clinic. Therefore, AD therapeutic research is still urgently needed.
Chunhong Gao +9 more
doaj +1 more source
Efficient design and evaluation of countermeasures against fault attacks using formal verification [PDF]
This paper presents a formal verification framework and tool that evaluates the robustness of software countermeasures against fault-injection attacks. By modeling reference assembly code and its protected variant as automata, the framework can generate ...
AG Bayrak +9 more
core +3 more sources
Toolbox of Countermeasures for Rural Two-Lane Curves, June 2012 [PDF]
The Federal Highway Administration (FHWA) estimates that 58 percent of roadway fatalities are lane departures, while 40 percent of fatalities are single-vehicle run-off-road (SVROR) crashes.
core

