Results 31 to 40 of about 111,415 (271)

Increasing the cyber resilience of SMEs through open-source solutions and international collaboration

open access: yesBulletin of "Carol I" National Defense University
In an increasingly digitalized world, small and medium-sized enterprises (SMEs) are exposed to significant cyber threats due to limited security resources.
Ionica ȘERBAN   +2 more
doaj   +1 more source

VDCM: A Data Collection Mechanism for Crowd Sensing in Vehicular Ad Hoc Networks

open access: yesBig Data Mining and Analytics, 2023
With the rapid development of mobile devices, aggregation security and efficiency topics are more important than past in crowd sensing. When collecting large-scale vehicle-provided data, the data transmitted via autonomous networks are publicly ...
Juli Yin   +6 more
doaj   +1 more source

Fabric‐Based Wearable Robotic Exoskeleton Gloves: Advancements and Challenges

open access: yesAdvanced Materials Technologies, EarlyView.
This review highlights interdisciplinary technological advances in fabric‐based robotic gloves, focusing on progress in design, fabrication, actuation, sensing, control, and power and energy requirements. It also addresses performance testing and validation, including biomechanical, strength, functional, user experience, and durability assessments, to ...
Ayse Feyza Yilmaz   +2 more
wiley   +1 more source

Nepenthes Honeypotsbased Botnet Detection

open access: yesJournal of Advances in Information Technology, 2012
The numbers of the botnet attacks are increasing day by day and the detection of botnet spreading in the network has become very challenging. Bots are having specific characteristics in comparison of normal malware as they are controlled by the remote ...
Sanjeev Kumar   +3 more
doaj   +1 more source

Deepfake Detection Algorithm Based on Dual-Branch Data Augmentation and Modified Attention Mechanism

open access: yesApplied Sciences, 2023
Mainstream deepfake detection algorithms generally fail to fully extract forgery traces and have low accuracy when detecting forged images with natural corruptions or human damage.
Da Wan   +4 more
doaj   +1 more source

Systematic Benchmarking of a Noise‐Tolerant Conductive Hydrogel Electrode for Epidermal Bioelectronics

open access: yesAdvanced Science, EarlyView.
General schematic of the approach. Abstract Conventional Silver/Silver Chloride (Ag/AgCl) electrodes remain the clinical standard for electrophysiological monitoring but are hindered by poor skin conformity, mechanical rigidity, and signal degradation, particularly under motion or sweat.
Nazmi Alsaafeen   +11 more
wiley   +1 more source

Joint Modal Alignment and Feature Enhancement for Visible-Infrared Person Re-Identification

open access: yesSensors, 2023
Visible-infrared person re-identification aims to solve the matching problem between cross-camera and cross-modal person images. Existing methods strive to perform better cross-modal alignment, but often neglect the critical importance of feature ...
Ronghui Lin   +4 more
doaj   +1 more source

Temperature‐Resilient Reconfigurable Physical Unclonable Function Driven by Pulse Modulation Using CMOS‐Integrated Spintronic Chips

open access: yesAdvanced Science, EarlyView.
A reconfigurable physical unclonable function is developed using CMOS‐integrated SOT‐MRAM chips, leveraging a dual‐pulse strategy and offering enhanced environmental robustness. A temperature‐compensation effect arising from the CMOS transistor and SOT‐MTJ is revealed and established as a key prerequisite for thermal resilience.
Min Wang   +7 more
wiley   +1 more source

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, EarlyView.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

GHEFL: Grouping Based on Homomorphic Encryption Validates Federated Learning

open access: yesFuture Internet
Federated learning is a powerful tool for securing participants’ private data due to its ability to make data “available but not visible”. In recent years, federated learning has been enhanced by the emergence of multi-weight aggregation protocols, which
Yulin Kang   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy