Results 11 to 20 of about 104,418 (235)

The THREAT-ARREST Cyber-Security Training Platform [PDF]

open access: yes, 2020
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations.
ASA-M Al-Ghamdi   +10 more
core   +1 more source

From cyber-security deception to manipulation and gratification through gamification [PDF]

open access: yes, 2019
Over the last two decades the field of cyber-security has experienced numerous changes associated with the evolution of other fields, such as networking, mobile communications, and recently the Internet of Things (IoT) [3].
DM Buss   +8 more
core   +4 more sources

Longitudinal performance analysis of machine learning based Android malware detectors [PDF]

open access: yes, 2019
This paper presents a longitudinal study of the performance of machine learning classifiers for Android malware detection. The study is undertaken using features extracted from Android applications first seen between 2012 and 2016.
Khan, Sarmadullah, Yerima, Suleiman
core   +1 more source

Temperature‐Resilient Reconfigurable Physical Unclonable Function Driven by Pulse Modulation Using CMOS‐Integrated Spintronic Chips

open access: yesAdvanced Science, EarlyView.
A reconfigurable physical unclonable function is developed using CMOS‐integrated SOT‐MRAM chips, leveraging a dual‐pulse strategy and offering enhanced environmental robustness. A temperature‐compensation effect arising from the CMOS transistor and SOT‐MTJ is revealed and established as a key prerequisite for thermal resilience.
Min Wang   +7 more
wiley   +1 more source

Synaptic κ‐Ga2O3 Photodetectors for Privacy‐Enhancing Neuromorphic Computing

open access: yesAdvanced Science, EarlyView.
We report on a single‐element neuromorphic sensor based on the persistent photoconductivity (PPC) of κ‐phase Ga2O3 capable of sensing ultraviolet light and harnessing intrinsic data privacy. The approach establishes a materials‐enabled pathway toward compact, intelligent, and privacy‐enhancing optoelectronic hardware for next‐generation edge systems ...
Yanqing Jia   +13 more
wiley   +1 more source

AI in chemical engineering: From promise to practice

open access: yesAIChE Journal, EarlyView.
Abstract Artificial intelligence (AI) in chemical engineering has moved from promise to practice: physics‐aware (gray‐box) models are gaining traction, reinforcement learning complements model predictive control (MPC), and generative AI powers documentation, digitization, and safety workflows.
Jia Wei Chew   +4 more
wiley   +1 more source

Gamification techniques for raising cyber security awareness [PDF]

open access: yes, 2019
Due to the prevalence of online services in modern society, such as internet banking and social media, it is important for users to have an understanding of basic security measures in order to keep themselves safe online. However, users often do not know
A Domínguez   +14 more
core   +3 more sources

Zero Watermarking Using Convolutional Additive Self‐Attention Vision Transformer and Discrete Wavelet Transform‐Variance‐Based Feature Descriptor for Medical Image Security in Mobile Healthcare Services

open access: yesAdvanced Intelligent Systems, EarlyView.
A zero‐watermarking algorithm that combines a refined convolutional additive self‐attention vision transformer (CAS‐ViT) with a discrete wavelet transform variance‐based feature descriptor (DVFD) is proposed for protecting the privacy of medical images in mobile healthcare services.
Pei Liu   +6 more
wiley   +1 more source

An Intelligent Feature Engineering‐Driven Hybrid Framework for Adversarial Domain Name System Tunneling Detection

open access: yesAdvanced Intelligent Systems, EarlyView.
This study presents a novel framework that enhances the reliability of DNS traffic monitoring using a hybrid long short‐term memory‐deep neural network (LSMT‐DNN) architecture, enabling robust detection of adversarial DNS tunneling. The proposed framework leverages feature extraction from DNS traffic patterns, including domain request sequences, query ...
Ahmad Almadhor   +5 more
wiley   +1 more source

Кибербезопасность в образовательных сетях [PDF]

open access: yes, 2020
The paper discusses the possible impact of digital space on a human, as well as human-related directions in cyber-security analysis in the education: levels of cyber-security, social engineering role in cyber-security of education, “cognitive vaccination”
Burov, Oleksandr   +7 more
core   +1 more source

Home - About - Disclaimer - Privacy