Results 51 to 60 of about 776,400 (220)

Enhancing the security of memory in cloud infrastructure through in‐phase change memory data randomisation

open access: yesIET Computers & Digital Techniques, 2021
As a promising alternative to dynamic RAM, phase change memory (PCM) suffers from limited write endurance. Therefore, many research proposals on PCM security or reliability have focussed on the possible threat of wear‐out attacks from malicious ...
Xianzhong Zhou, Ying Wang
doaj   +1 more source

Eight years of rider measurement in the Android malware ecosystem: evolution and lessons learned [PDF]

open access: yes, 2018
Despite the growing threat posed by Android malware, the research community is still lacking a comprehensive view of common behaviors and trends exposed by malware families active on the platform.
Stringhini, Gianluca   +1 more
core  

Waiting for a Release: The Expectation in Virtual Gaming Communities

open access: yesJournal of Consumer Behaviour, EarlyView.
ABSTRACT This study examines how virtual gaming communities influence and maintain player expectations before, during, and after a game's release. A mixed‐methods study was conducted, comprising a netnography followed by an experiment. First, a netnographic study was conducted over 12 months, tracking communities to understand player behavior and ...
Lucas Lopes Ferreira de Souza   +4 more
wiley   +1 more source

Reusing Logic Masking to Facilitate Hardware Trojan Detection [PDF]

open access: yes, 2016
Hardware Trojan (HT) and Integrated Circuit (IC)/ Intellectual Property (IP) piracy are important threats which may happen in untrusted fabrication foundries.
Beroulle, Vincent   +2 more
core  

Full Science, Technology, Engineering, Arts and Mathematics Ahead: Leveraging Immersive Virtual Reality to Create Equitable and Transformative Learning Experiences

open access: yesFuture in Educational Research, EarlyView.
ABSTRACT Immersive virtual reality (IVR) is widely promoted as a means of enriching learning in science, technology, engineering, arts and mathematics (STEAM), yet evidence of its capacity to foster equitable classroom experiences for marginalised groups remains limited, particularly outside traditional STEM domains.
Carly Waterhouse‐Boot   +1 more
wiley   +1 more source

Dynamic Analysis of Executables to Detect and Characterize Malware

open access: yes, 2018
It is needed to ensure the integrity of systems that process sensitive information and control many aspects of everyday life. We examine the use of machine learning algorithms to detect malware using the system calls generated by executables-alleviating ...
Aimone, James B.   +6 more
core   +1 more source

Towards cognitive obfuscation [PDF]

open access: yesProceedings of the 24th Asia and South Pacific Design Automation Conference, 2019
In contrast to software reverse engineering, there are hardly any tools available that support hardware reversing. Therefore, the reversing process is conducted by human analysts combining several complex semi-automated steps. However, countermeasures against reversing are evaluated solely against mathematical models.
Wiesen, Carina   +7 more
openaire   +2 more sources

Practical Implementation of Robust State-Space Obfuscation for Hardware IP Protection

open access: yesIEEE Transactions on Very Large Scale Integration (VLSI) Systems
Hardware obfuscation is a design transformation technique that transforms a design to protect its confidentiality against untrusted parties. In particular, it aims at protecting proprietary hardware intellectual property (IP) blocks against reverse ...
Md. Moshiur Rahman, S. Bhunia
semanticscholar   +1 more source

RTL Interconnect Obfuscation By Polymorphic Switch Boxes For Secure Hardware Generation [PDF]

open access: yesIEEE International Symposium on Quality Electronic Design
Logic Obfuscation is a well renowned design-for-trust solution to protect an Integrated Circuit (IC) from unauthorized use and illegal overproduction by including key-gates to lock the design.
Haimanti Chakraborty, Ranga Vemuri
semanticscholar   +1 more source

Photo‐Excitations in Halide Perovskites: Where Do Simulations and Experiments Meet?

open access: yesLaser &Photonics Reviews, EarlyView.
Aiming to bridge the gap between simulations and measurements of light–matter couplings and photo‐excitations in new functional materials, this perspective highlights insights and bottlenecks of state‐of‐the‐art experimental and theoretical methods (2D electronic spectroscopy vs.
Muhammad Sufyan Ramzan   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy