Evading Antivirus Detection Using Fountain Code-Based Techniques for Executing Shellcodes. [PDF]
Huang GC, Chang KC, Lai TH.
europepmc +1 more source
Open, reproducible hardware for microscopy. [PDF]
Bowman R +5 more
europepmc +1 more source
Hardware-Efficient Configurable Ring-Oscillator-Based Physical Unclonable Function/True Random Number Generator Module for Secure Key Management. [PDF]
Sánchez-Solano S +3 more
europepmc +1 more source
Comprehensive analysis of security threats and privacy issues in indoor localization systems. [PDF]
Ayub A +6 more
europepmc +1 more source
Physical unclonable function using photonic spin Hall effect. [PDF]
Divyanshu D, Goyal AK, Massoud Y.
europepmc +1 more source
Driving into the Unknown: Investigating and Addressing Security Breaches in Vehicle Infotainment Systems. [PDF]
Yan M, Crane G, Suillivan D, Shan H.
europepmc +1 more source
Fusion cryptography for secure medical data transmission using mathematical quantum computing operations. [PDF]
Aljaedi A +4 more
europepmc +1 more source
LWLCM: A novel lightweight stream cipher using logistic chaos function and multiplexer for IoT communications. [PDF]
Afzal S +5 more
europepmc +1 more source
Quantum-enhanced privacy aggregation for healthcare monitoring in wireless body area networks. [PDF]
Othman SB, Ali O.
europepmc +1 more source
Mobile malware detection method using improved GhostNetV2 with image enhancement technique. [PDF]
Du Y +5 more
europepmc +1 more source

