Results 61 to 70 of about 22,224 (372)

Chameleon sequences reveal structural effects in proteins representing micelle‐like distribution of hydrophobicity

open access: yesFEBS Open Bio, EarlyView.
Amino acids sequence of two different proteins with the same sequence (chameleon sequence—black boxes) represent in 3D structure of the proteins different secondary structures: HHHH—helical and BBB—Beta‐structural. The chains folded in water environment adopt different III‐order structures in which the chameleon fragments appear to adopt similar status
Irena Roterman   +4 more
wiley   +1 more source

SHFuzz: Selective Hybrid Fuzzing with Branch Scheduling Based on Binary Instrumentation

open access: yesApplied Sciences, 2020
Hybrid fuzzing is a popular software testing technique that combines random fuzzing with concolic execution. It is widely used in the security domain known for its ability to find deeply hidden vulnerabilities and reach high code coverage. Hybrid fuzzing
Xianya Mi   +4 more
doaj   +1 more source

Breaking of the adjoint string in 2+1 dimensions

open access: yes, 1999
The roughly linear rise of the potential found between adjoint sources in SU(N) in lattice simulations is expected to saturate into a state of two `gluelumps' due to gluonic screening. We examine this in SU(2) in 2+1 dimensions.
Albanese   +20 more
core   +1 more source

Multimodal Data‐Driven Microstructure Characterization

open access: yesAdvanced Engineering Materials, EarlyView.
A self‐consistent autonomous workflow for EBSP‐based microstructure segmentation by integrating PCA, GMM clustering, and cNMF with information‐theoretic parameter selection, requiring no user input. An optimal ROI size related to characteristic grain size is identified.
Qi Zhang   +4 more
wiley   +1 more source

Fuzzing With Optimized Grammar-Aware Mutation Strategies

open access: yesIEEE Access, 2021
Fuzzing is a widely used technique to discover vulnerabilities in software. However, for programs requiring highly structured inputs, the byte-based mutation strategies in existing fuzzers have difficulties in generating valid inputs.
Jiale Deng   +5 more
doaj   +1 more source

SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities

open access: yes, 2017
Algorithmic complexity vulnerabilities occur when the worst-case time/space complexity of an application is significantly higher than the respective average case for particular user-controlled inputs.
Betts A.   +5 more
core   +1 more source

Selective and Precise Editing of Digital Polymers Through Parallel or Series Toehold‐Mediated Strand Displacement

open access: yesAdvanced Functional Materials, EarlyView.
A sequence‐encoded supramolecular construct containing two accessible toeholds is developed herein for enabling multiple editing operations. By introducing specific input strands, it is possible to selectively erase or rewrite digital content through parallel or series toehold‐mediated strand displacement (PTMSD or STMSD).
Jakub Ossowski   +3 more
wiley   +1 more source

Bare-Metal Firmware Fuzzing: A Survey of Techniques and Approaches

open access: yesIEEE Access
Firmware attacks are increasingly prevalent, often serving as low-hanging fruit for attackers due to the challenges of firmware security analysis. The complexity of hardware systems, platform diversity, peripheral interactions, and asynchronous events ...
Asmita Asmita   +4 more
doaj   +1 more source

Recent Advances of Slip Sensors for Smart Robotics

open access: yesAdvanced Materials Technologies, EarlyView.
This review summarizes recent progress in robotic slip sensors across mechanical, electrical, thermal, optical, magnetic, and acoustic mechanisms, offering a comprehensive reference for the selection of slip sensors in robotic applications. In addition, current challenges and emerging trends are identified to advance the development of robust, adaptive,
Xingyu Zhang   +8 more
wiley   +1 more source

Keyword Sensitive Fuzzing Method for Embedded Device Firmware [PDF]

open access: yesJisuanji kexue
The firmware of most embedded devices provides a Web interface,which is convenient for the users to configure and manage the devices.However,the security problems of these Web interfaces usually bring challenges to the security of embedded devices ...
SI Jianpeng, HONG Zheng, ZHOU Zhenji, CHEN Qian, LI Tao
doaj   +1 more source

Home - About - Disclaimer - Privacy