Results 61 to 70 of about 63,648 (277)
Android Malware Clustering through Malicious Payload Mining
Clustering has been well studied for desktop malware analysis as an effective triage method. Conventional similarity-based clustering techniques, however, cannot be immediately applied to Android malware analysis due to the excessive use of third-party ...
I Santos +7 more
core +1 more source
Remote Computer Fingerprinting for Cyber Crime Investigations [PDF]
This paper describes a novel tool forremotely “fingerprinting” computers used in criminal activity. The tool employs network scanning and machine identification techniques to acquire a fingerprint of a computer over the Internet. The fingerprint includes identifying information about the operating system, banners, enumerations and services.
Jon Novotny +3 more
openaire +1 more source
PREdicting LNP In Vivo Efficacy (PRELIVE) framework enables the prediction of lipid nanoparticle (LNPs) organ‐specific delivery through dual modeling approaches. Composition‐based models using formulation parameters and protein corona‐based models using biological fingerprints both achieve high predictive accuracy across multiple organs.
Belal I. Hanafy +3 more
wiley +1 more source
Interactive Communication with Unknown Noise Rate
Alice and Bob want to run a protocol over a noisy channel, where a certain number of bits are flipped adversarially. Several results take a protocol requiring $L$ bits of noise-free communication and make it robust over such a channel.
Dani, Varsha +4 more
core +1 more source
Permanent magnets derive their extraordinary strength from deep, universal electronic‐structure principles that control magnetization, anisotropy, and intrinsic performance. This work uncovers those governing rules, examines modern modeling and AI‐driven discovery methods, identifies critical bottlenecks, and reveals electronic fingerprints shared ...
Prashant Singh
wiley +1 more source
Answering Spatial Multiple-Set Intersection Queries Using 2-3 Cuckoo Hash-Filters
We show how to answer spatial multiple-set intersection queries in O(n(log w)/w + kt) expected time, where n is the total size of the t sets involved in the query, w is the number of bits in a memory word, k is the output size, and c is any fixed ...
Eppstein David +3 more
core +1 more source
This study introduces a novel chloro boron subphthalocyanine/polymer blend OFET sensor achieving 0.005 ppb limit of detection for ammonia at room temperature and high selectivity against similar amines. An original theoretical framework is proposed to describe the sensing mechanism, relating analyte molecular volume and Lewis basicity to sensor ...
Kavinraaj Ella Elangovan +6 more
wiley +1 more source
A pixelation‐free, monolithic iontronic pressure sensor enables simultaneous pressure and position sensing over large areas. AC‐driven ion release generates spatially varying impedance pathways depending on the pressure. Machine learning algorithms effectively decouple overlapping pressure–position signals from the multichannel outputs, achieving high ...
Juhui Kim +10 more
wiley +1 more source
2D Magnetic and Topological Quantum Materials and Devices for Ultralow Power Spintronics
2D magnets and topological quantum materials enable ultralow‐power spintronics by combining robust magnetic order with symmetry‐protected, Berry‐curvature‐driven transport. Fundamentals of 2D anisotropy and spin‐orbit‐coupling induced band inversion are linked to scalable growth and vdW stacking.
Brahmdutta Dixit +5 more
wiley +1 more source
Preprint: Using RF-DNA Fingerprints To Classify OFDM Transmitters Under Rayleigh Fading Conditions
The Internet of Things (IoT) is a collection of Internet connected devices capable of interacting with the physical world and computer systems. It is estimated that the IoT will consist of approximately fifty billion devices by the year 2020. In addition
Fadul, Mohamed +3 more
core

