Results 71 to 80 of about 2,457,982 (249)
POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers [PDF]
It is known that attackers can exfiltrate data from air-gapped computers through their speakers via sonic and ultrasonic waves. To eliminate the threat of such acoustic covert channels in sensitive systems, audio hardware can be disabled and the use of ...
Guri, Mordechai
core +1 more source
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
Electromagnetic signal recognition model based on multi-channel dilated dense convolutional networks [PDF]
This paper addresses the issue of low accuracy in electromagnetic signal recognition when applying existing deep learning networks. It studies classic deep learning network solutions for electromagnetic signal recognition both domestically and ...
LAN Song, LIU Bin, ZHAO Yaqi, GUO Anye, ZHANG Xuebin, KONG Weice
doaj +1 more source
The linear frequency‐modulated frequency agile radar (FAR) can be used for synthesizing high‐range‐resolution profiles (HRRP), and also has excellent electronic counter‐countermeasures performance. Similar to the Newtonalized orthogonal matching pursuit (
Jiang Zhu +4 more
doaj +1 more source
Early evaluation of security functionality in software projects - some experience on using the common criteria in a quality management process [PDF]
This paper documents the experiences of assurance evaluation during the early stage of a large software development project. This project researches, contracts and integrates privacy-respecting software to business environments.
Fritsch, Lothar, Scherner, Tobias
core
ABSTRACT Introduction Following rapid iterations in media technologies, Chinese millennials (born between 1980 and 1995) find themselves in a paradoxical state where digital saturation exists alongside fatigue, making them central practitioners of digital minimalist behavior.
Chao Zhang, Yinze Hao, Jingwen Li
wiley +1 more source
Redefining Optimal Coverage Path Planning for FLS‐Equipped AUVs With Deep Reinforcement Learning
ABSTRACT Autonomous Underwater Vehicles (AUVs) have emerged as indispensable tools for a variety of subsea tasks, from habitat monitoring and seabed mapping to infrastructure inspection and mine countermeasures. A fundamental challenge in this field is Coverage Path Planning (CPP), the problem of ensuring complete and efficient area coverage.
Lorenzo Cecchi +3 more
wiley +1 more source
DMR: disentangled and denoised learning for multi-behavior recommendation
In recommender systems, leveraging auxiliary behaviors (e.g. view, cart) to enhance the recommendation in the target behavior (e.g. purchase) is crucial for mitigating the sparsity issue inherent in single-behavior recommendation.
Yijia Zhang +4 more
doaj +1 more source
Comparison of bungee-aided and free-bouncing accelerations on trampoline [PDF]
Trampolines remain the single best apparatus for the training of aerial acrobatics skills. Trampoline use has led to catastrophic injuries from poor landings.
Barker, L +6 more
core
Sampling, Mobility, and Anchoring in Small‐Body Sampling Robots: A Comprehensive Review
Small‐body sampling robots are exploration systems that perform contact, sampling, and stable operations on microgravity bodies such as asteroids and comets. The authors review representative robot architectures and key technologies, focusing on the mechanisms, evolution, and coupling of sampling, mobility, and anchoring.
Yurui Shen +7 more
wiley +1 more source

