Results 31 to 40 of about 181,953 (301)

Autoscaled-Wavelet Convolutional Layer for Deep Learning-Based Side-Channel Analysis

open access: yesIEEE Access, 2023
Continuous Wavelet Transform (CWT) is rarely used in the field of side-channel analysis due to problems related to parameter (wavelet scale) selection; There is no way to find the optimal wavelet scale other than an exhaustive search, and the resulting ...
Daehyeon Bae   +6 more
doaj   +1 more source

A Neural Network-Based Approach for Cryptographic Function Detection in Malware

open access: yesIEEE Access, 2020
Cryptographic technology has been commonly used in malware for hiding their static characteristics and malicious behaviors to avoid the detection of anti-virus engines and counter the reverse analysis from security researchers.
Li Jia   +5 more
doaj   +1 more source

Institutional Strategies for Cybersecurity in Higher Education Institutions

open access: yesInformation, 2022
Cybersecurity threats have grown exponentially, posing a heavy burden on organisations. Higher Education Institutions (HEIs) are particularly vulnerable, and their cybersecurity issues are receiving greater attention.
Eric C. K. Cheng, Tianchong Wang
doaj   +1 more source

Games for Cybersecurity Decision-making [PDF]

open access: yes, 2020
Decision-makers are often confronted with cybersecurity challenges, which they may not fully comprehend but nonetheless need to critically address. Efficient preparation through cybersecurity games has become an invaluable tool to better prepare strategy
A Chung   +4 more
core   +2 more sources

DPAD: Distribution-Driven Perturbation-Adaptive Defense for UAV Time-Series Regression Under Hybrid Adversarial Attacks

open access: yesDrones
Time-series regression models are essential components in unmanned aerial vehicles (UAVs) for accurate trajectory and state prediction. Nevertheless, they are still vulnerable to hybrid adversarial attacks, which can lead to a compromised mission ...
Bo Xu   +9 more
doaj   +1 more source

How does intellectual capital align with cyber security? [PDF]

open access: yes, 2019
Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their ...
Renaud, Karen   +2 more
core   +3 more sources

Materials and System Design for Self‐Decision Bioelectronic Systems

open access: yesAdvanced Materials, EarlyView.
This review highlights how self‐decision bioelectronic systems integrate sensing, computation, and therapy into autonomous, closed‐loop platforms that continuously monitor and treat diseases, marking a major step toward intelligent, self‐regulating healthcare technologies.
Qiankun Zeng   +9 more
wiley   +1 more source

A Characterization of Cybersecurity Posture from Network Telescope Data [PDF]

open access: yes, 2016
Data-driven understanding of cybersecurity posture is an important problem that has not been adequately explored. In this paper, we analyze some real data collected by CAIDA's network telescope during the month of March 2013.
Xu, Maochao, Xu, Shouhuai, Zhan, Zhenxin
core  

Soft, Flexible, and Stretchable Platforms for Tissue‐Interfaced Bioelectronics

open access: yesAdvanced Science, EarlyView.
Bio‐integrated electronics provide mechanically compliant and stable interfaces with soft biological tissues. Representative applications include neural interfaces, wet‐organadhesive electronics, and skin‐interfaced devices. E represents Young´s modulus and ε represents strain.
Kento Yamagishi   +3 more
wiley   +1 more source

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, EarlyView.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy