Results 71 to 80 of about 2,457,982 (249)

POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers [PDF]

open access: yes, 2020
It is known that attackers can exfiltrate data from air-gapped computers through their speakers via sonic and ultrasonic waves. To eliminate the threat of such acoustic covert channels in sensitive systems, audio hardware can be disabled and the use of ...
Guri, Mordechai
core   +1 more source

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

Electromagnetic signal recognition model based on multi-channel dilated dense convolutional networks [PDF]

open access: yesZhihui kongzhi yu fangzhen
This paper addresses the issue of low accuracy in electromagnetic signal recognition when applying existing deep learning networks. It studies classic deep learning network solutions for electromagnetic signal recognition both domestically and ...
LAN Song, LIU Bin, ZHAO Yaqi, GUO Anye, ZHANG Xuebin, KONG Weice
doaj   +1 more source

Newtonalized orthogonal matching pursuit for the linear frequency‐modulated pulse frequency agile radar

open access: yesIET Radar, Sonar & Navigation, 2021
The linear frequency‐modulated frequency agile radar (FAR) can be used for synthesizing high‐range‐resolution profiles (HRRP), and also has excellent electronic counter‐countermeasures performance. Similar to the Newtonalized orthogonal matching pursuit (
Jiang Zhu   +4 more
doaj   +1 more source

Early evaluation of security functionality in software projects - some experience on using the common criteria in a quality management process [PDF]

open access: yes, 2007
This paper documents the experiences of assurance evaluation during the early stage of a large software development project. This project researches, contracts and integrates privacy-respecting software to business environments.
Fritsch, Lothar, Scherner, Tobias
core  

Between Dependence and Alienation: Understanding the Digital Minimalist Behavior of Chinese Millennials—An Analysis Based on SEM and fsQCA

open access: yesJournal of Adolescence, EarlyView.
ABSTRACT Introduction Following rapid iterations in media technologies, Chinese millennials (born between 1980 and 1995) find themselves in a paradoxical state where digital saturation exists alongside fatigue, making them central practitioners of digital minimalist behavior.
Chao Zhang, Yinze Hao, Jingwen Li
wiley   +1 more source

Redefining Optimal Coverage Path Planning for FLS‐Equipped AUVs With Deep Reinforcement Learning

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Autonomous Underwater Vehicles (AUVs) have emerged as indispensable tools for a variety of subsea tasks, from habitat monitoring and seabed mapping to infrastructure inspection and mine countermeasures. A fundamental challenge in this field is Coverage Path Planning (CPP), the problem of ensuring complete and efficient area coverage.
Lorenzo Cecchi   +3 more
wiley   +1 more source

DMR: disentangled and denoised learning for multi-behavior recommendation

open access: yesComplex & Intelligent Systems
In recommender systems, leveraging auxiliary behaviors (e.g. view, cart) to enhance the recommendation in the target behavior (e.g. purchase) is crucial for mitigating the sparsity issue inherent in single-behavior recommendation.
Yijia Zhang   +4 more
doaj   +1 more source

Comparison of bungee-aided and free-bouncing accelerations on trampoline [PDF]

open access: yes, 2019
Trampolines remain the single best apparatus for the training of aerial acrobatics skills. Trampoline use has led to catastrophic injuries from poor landings.
Barker, L   +6 more
core  

Sampling, Mobility, and Anchoring in Small‐Body Sampling Robots: A Comprehensive Review

open access: yesSmartBot, EarlyView.
Small‐body sampling robots are exploration systems that perform contact, sampling, and stable operations on microgravity bodies such as asteroids and comets. The authors review representative robot architectures and key technologies, focusing on the mechanisms, evolution, and coupling of sampling, mobility, and anchoring.
Yurui Shen   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy