Results 41 to 50 of about 264,704 (267)
Threat analysis and defense methods of deep-learning-based data theft in data sandbox mode
The threat model of deep-learning-based data theft in data sandbox model was analyzed in detail, and the degree of damage and distinguishing characteristics of this attack were quantitatively evaluated both in the data processing stage and the model ...
Hezhong PAN +5 more
doaj +2 more sources
Side-channel based intrusion detection for industrial control systems
Industrial Control Systems are under increased scrutiny. Their security is historically sub-par, and although measures are being taken by the manufacturers to remedy this, the large installed base of legacy systems cannot easily be updated with state-of ...
A Beckers +13 more
core +1 more source
Time after time – circadian clocks through the lens of oscillator theory
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo +2 more
wiley +1 more source
Structural biology of ferritin nanocages
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley +1 more source
Improved meet-in-the-middle attack on ARIA cipher
A study on the structure of ARIA cipher is presented. A new 4-round distinguishing property for the meet-in-the-middle attack on ARIA cipher is presented by making use of the multiset and the truncated differential char-acteristic. The new distinguishing
Man-man LI, Shao-zhen CHEN
doaj +2 more sources
Cryptanalysis of AES-PRF and Its Dual
A dedicated pseudorandom function (PRF) called AES-PRF was proposed by Mennink and Neves at FSE 2018 (ToSC 2017, Issue 3). AES-PRF is obtained from AES by using the output of the 5-th round as the feed-forward to the output state.
Patrick Derbez +6 more
doaj +1 more source
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lamberger, Mario +4 more
openaire +2 more sources
Improved fuzzy vault scheme for fingerprint verification [PDF]
Fuzzy vault is a well-known technique to address the privacy concerns in biometric identification applications. We revisit the fuzzy vault scheme to address implementation, efficiency, and security issues encountered in its realization.
Keskinoz, Mehmet +6 more
core
Mechanisms of IgE‐mediated food allergy and the role of allergen‐specific B cells
Food allergy arises when allergen‐specific B cells preferentially produce immunoglobulin E (IgE) antibodies against harmless foods. This article explains the mechanisms driving IgE‐mediated reactions, highlights the central role of these B cells, and discusses how natural tolerance (NT) and oral immunotherapy (OIT) can reshape allergic immune responses.
Juan‐Felipe López +2 more
wiley +1 more source
Existing False data injection attack (FDIA) detection methods based on measurement similarity testing have difficulty in distinguishing between actual power grid accidents and FDIAs.
Yihua Zhu +7 more
doaj +1 more source

