Results 51 to 60 of about 2,457,982 (249)
CIDPro: Custom Instructions for Dynamic Program Diversification
Timing side-channel attacks pose a major threat to embedded systems due to their ease of accessibility. We propose CIDPro, a framework that relies on dynamic program diversification to mitigate timing side-channel leakage.
Biswas, Arnab Kumar +4 more
core +1 more source
Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [PDF]
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value.
Aburrous, Maher +3 more
core +1 more source
By leveraging this homodimerization mechanism, molecular glues were rationally designed to induce dysfunctional 3A dimerization, thereby restoring antiviral RNAi. The optimal molecular glue, VTP‐32, demonstrated potent and pan‐enterovirus (groups A, B, D) antiviral effects.
Yuan Fang +13 more
wiley +1 more source
Modified Variable Step Size FLOM-CMA Based on Lorentzian Function under Impulse Noise
Aiming at the problem that the traditional equalization algorithm under impulse noise is difficult to suppress impulse noise and achieve equalization, a new modified variable step size FLOM-CMA algorithm based on Lorentzian function is proposed in this ...
Liao Xichang, Lei Yingke
doaj +1 more source
A Study on Risk Analysis and Countermeasures of Electronic Financial Fraud
The methods of electronic financial fraud continue to evolve.
D. Jeong, Gibum Kim, Sangjin Lee
semanticscholar +1 more source
Terahertz Channel Modeling, Estimation and Localization in RIS‐Assisted Systems
Reconfigurable intelligent surfaces have become a recent intensive research focus. Based on practical applications, channel strategies for RIS‐assisted terahertz wireless communication systems are categorized into three different types: channel modeling, channel estimation, and channel localization.
Hongjing Wang +9 more
wiley +1 more source
Cyber-Security in Smart Grid: Survey and Challenges
Smart grid uses the power of information technology to intelligently deliver energy to customers by using a two-way communication, and wisely meet the environmental requirements by facilitating the integration of green technologies.
Ghazi, Hamid El +3 more
core +1 more source
Using HTML5 to Prevent Detection of Drive-by-Download Web Malware [PDF]
The web is experiencing an explosive growth in the last years. New technologies are introduced at a very fast-pace with the aim of narrowing the gap between web-based applications and traditional desktop applications.
De Maio, Giancarlo +2 more
core +2 more sources
Electronic countermeasure for OFDM‐based imaging passive radars
Passive radars are notoriously robust to jamming because the receiver location cannot be detected. Moreover, the use of Orthogonal Frequency Division Multiplexing (OFDM)‐based reference signals further improves the robustness against jammers. Nevertheless, deception/spoofing‐type of jamming may still be possible.
Giusti E. +4 more
openaire +1 more source
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury +2 more
wiley +1 more source

