Results 41 to 50 of about 10,885 (123)

Hardware Security for Edge Computing Via CMOS‐Compatible Multi‐Level Flash Memory with Hash‐Based Key Generation

open access: yesAdvanced Electronic Materials, Volume 11, Issue 19, November 18, 2025.
A CMOS‐compatible flash memory structure with multi‐level programming produces reliable and reproducible physically unclonable functions (PUFs) for secure IoT applications. Device‐specific variations in flat‐band voltage enable scalable key generation without standby power.
Kyumin Sim   +6 more
wiley   +1 more source

A Fusion Filtering‐Based Method for Extracting Spectral Trajectories of Non‐Repetitive Transient Weak Signals in Multiple Frequency Bands for Industrial Control Networks

open access: yesEngineering Reports, Volume 7, Issue 11, November 2025.
This study introduces a fusion filtering‐based method to accurately extract spectral trajectories of non‐repetitive transient weak signals in industrial control networks, enhancing signal clarity and reliability across multiple frequency bands. ABSTRACT In response to the problem of difficulty in accurately extracting spectral trajectories of multi ...
Changzhong Gao   +4 more
wiley   +1 more source

Resilient cybersecurity in smart grid ICS communication using BLAKE3-driven dynamic key rotation and intrusion detection. [PDF]

open access: yesSci Rep
Dokku NS   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy