Results 31 to 40 of about 181,953 (301)
Autoscaled-Wavelet Convolutional Layer for Deep Learning-Based Side-Channel Analysis
Continuous Wavelet Transform (CWT) is rarely used in the field of side-channel analysis due to problems related to parameter (wavelet scale) selection; There is no way to find the optimal wavelet scale other than an exhaustive search, and the resulting ...
Daehyeon Bae +6 more
doaj +1 more source
A Neural Network-Based Approach for Cryptographic Function Detection in Malware
Cryptographic technology has been commonly used in malware for hiding their static characteristics and malicious behaviors to avoid the detection of anti-virus engines and counter the reverse analysis from security researchers.
Li Jia +5 more
doaj +1 more source
Institutional Strategies for Cybersecurity in Higher Education Institutions
Cybersecurity threats have grown exponentially, posing a heavy burden on organisations. Higher Education Institutions (HEIs) are particularly vulnerable, and their cybersecurity issues are receiving greater attention.
Eric C. K. Cheng, Tianchong Wang
doaj +1 more source
Games for Cybersecurity Decision-making [PDF]
Decision-makers are often confronted with cybersecurity challenges, which they may not fully comprehend but nonetheless need to critically address. Efficient preparation through cybersecurity games has become an invaluable tool to better prepare strategy
A Chung +4 more
core +2 more sources
Time-series regression models are essential components in unmanned aerial vehicles (UAVs) for accurate trajectory and state prediction. Nevertheless, they are still vulnerable to hybrid adversarial attacks, which can lead to a compromised mission ...
Bo Xu +9 more
doaj +1 more source
How does intellectual capital align with cyber security? [PDF]
Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their ...
Renaud, Karen +2 more
core +3 more sources
Materials and System Design for Self‐Decision Bioelectronic Systems
This review highlights how self‐decision bioelectronic systems integrate sensing, computation, and therapy into autonomous, closed‐loop platforms that continuously monitor and treat diseases, marking a major step toward intelligent, self‐regulating healthcare technologies.
Qiankun Zeng +9 more
wiley +1 more source
A Characterization of Cybersecurity Posture from Network Telescope Data [PDF]
Data-driven understanding of cybersecurity posture is an important problem that has not been adequately explored. In this paper, we analyze some real data collected by CAIDA's network telescope during the month of March 2013.
Xu, Maochao, Xu, Shouhuai, Zhan, Zhenxin
core
Soft, Flexible, and Stretchable Platforms for Tissue‐Interfaced Bioelectronics
Bio‐integrated electronics provide mechanically compliant and stable interfaces with soft biological tissues. Representative applications include neural interfaces, wet‐organadhesive electronics, and skin‐interfaced devices. E represents Young´s modulus and ε represents strain.
Kento Yamagishi +3 more
wiley +1 more source
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu +5 more
wiley +1 more source

