Results 131 to 140 of about 257,742 (291)
Attack Tree Generation via Process Mining
Attack Trees are a graphical model of security used to study threat scenarios. While visually appealing and supported by solid theories and effective tools, one of their main drawbacks remains the amount of effort required by security experts to design them from scratch.
Alyzia-Maria Konsta +3 more
openaire +2 more sources
Survey: Automatic generation of attack trees and attack graphs
Graphical security models constitute a well-known, user-friendly way to represent the security of a system. These classes of models are used by security experts to identify vulnerabilities and assess the security of a system. The manual construction of these models can be tedious, especially for large enterprises.
Alyzia-Maria Konsta +3 more
openaire +2 more sources
Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data
The first two authors contributed ...
Yang, Puyudi +4 more
openaire +3 more sources
A volatile‐switching compact model of electrochemical metallization memory cells for neuromorphic architecture is developed and validated by reliable reproduction of device characterization measurements: I−V sweeps, SET kinetics, relaxation dynamics.
Rana Walied Ahmad +4 more
wiley +1 more source
A gram‐scale supply of bulbiferamide A, which features a rare N‐acylindole linkage and possesses potent inhibitory activity against Trypanosoma cruzi epimastigotes (IC50 = 4.1 µM)—the causative parasite of Chagas disease—was successfully achieved. Moreover, the cyclization strategy developed in this study facilitated the synthesis of noncanonical ...
Jie Zhang, Hugh Nakamura
wiley +2 more sources
Modular Electronic Microrobots With Onboard Sensor‐Program‐Steered Locomotion
Modular electronic smartlet microrobots integrate ambient‐light energy harvesting, photodetection, programmable CMOS control, and bubble‐based actuation within a sub‐millimeter fold‐up architecture. A 58‐bit on‐board CMOS chiplet enables sensor–program steered switching between independently addressable actuators, achieving closed‐loop 2D navigation in
Vineeth K. Bandari +6 more
wiley +1 more source
Accelerating Catalyst Materials Discovery With Large Artificial Intelligence Models
AI‐empowered catalysis research via integrated database platform, universal machine learning interatomic potentials (MLIPs), and large language models (LLMs). ABSTRACT The integration of artificial intelligence (AI) into catalysis is fundamentally reshaping the research paradigm of catalyst discovery.
Di Zhang +7 more
wiley +2 more sources
Attack Graph Generation on HPC Clusters
Attack graphs (AGs) are graphical tools to analyze the security of computer networks. By connecting the exploitation of individual vulnerabilities, AGs expose possible multi-step attacks against target networks, allowing system administrators to take preventive measures to enhance their network's security. As powerful analytical tools, however, AGs are
Ming Li, John Hale
openaire +2 more sources
This study provides an introduction to Bayesian optimisation targeted for experimentalists. It explains core concepts, surrogate modelling, and acquisition strategies, and addresses common real‐world challenges such as noise, constraints, mixed variables, scalability, and automation.
Chuan He +2 more
wiley +1 more source
Depolymerization and Reuse of Polycarbonates: Emerging Classes, Mechanisms and Challenges
This review collects the latest developments in the area of chemical and catalytic polycarbonate recycling strategies and includes the controlled degradation of similar types of macromolecules. Apart from the main strategies for deconstruction, the key mechanistic features of these depolymerization processes are also discussed together with the ...
Davide Rigo +4 more
wiley +2 more sources

