Results 51 to 60 of about 526,457 (288)
Design and Implementation of a Physically Secure Open-Source FPGA and Toolchain
The increasing prevalence of security breaches highlights the importanceof robust hardware security measures. Among these breaches, physical attacks– such as Side-Channel Analysis ( SCA) and Fault Injection (FI ) attacks – posea significant challenge ...
Sergej Meschkov +3 more
doaj +1 more source
THE PROTOTYPE OF SECURITY SYSTEMS CONNECTED TO THE SECURITY POST USING PIR CENSOR AND SIEMENS C45 MOBILE BASED MICROCONTROLLER ATMEGA 16 [PDF]
Purpose of making the prototype of secutity sistems connected to the security post using pir censor and siemens c45 mobile based microcontroller ATmega 16 is to create a tool that can directly send information to a security post during a robbery, so that
Kurniawan, Agus Prasetya
core
This review highlights recent advances in smart face masks that actively monitor breathing. By integrating humidity, gas, temperature, pressure, strain, and triboelectric sensors, these masks track key respiratory parameters in real time. The article summarizes sensor mechanisms, compares performance across studies, and discusses challenges and future ...
Negin Faramarzi +7 more
wiley +1 more source
An Advanced Detection Framework for Embedded System Vulnerabilities
Embedded systems serve as the foundation for modern computing in industrial, IoT, and defense applications. However, their increased adoption exposes them to security threats across multiple levels, from application software to operating systems and ...
Mansour Alqarni, Akramul Azim
doaj +1 more source
Ferroelectric Quantum Dots for Retinomorphic In‐Sensor Computing
This work has provided a protocol for fabricating retinomorphic phototransistors by integrating ferroelectric ligands with quantum dots. The resulting device combines ferroelectricity, optical responsiveness, and low‐power operation to enable adaptive signal amplification and high recognition accuracy under low‐light conditions, while supporting ...
Tingyu Long +26 more
wiley +1 more source
Hardware Validation for Semi-Coherent Transmission Security
The rapid growth of Internet-connected devices integrating into our everyday lives has no end in sight. As more devices and sensor networks are manufactured, security tends to be a low priority.
Michael Fletcher +2 more
doaj +1 more source
A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL
Split manufacturing was introduced as an effective countermeasure against hardware-level threats such as IP piracy, overbuilding, and insertion of hardware Trojans.
Knechtel, Johann +3 more
core +1 more source
Bioinspired Adaptive Sensors: A Review on Current Developments in Theory and Application
This review comprehensively summarizes the recent progress in the design and fabrication of sensory‐adaptation‐inspired devices and highlights their valuable applications in electronic skin, wearable electronics, and machine vision. The existing challenges and future directions are addressed in aspects such as device performance optimization ...
Guodong Gong +12 more
wiley +1 more source
Drawing inspiration from the layered hard‐soft architecture found in sea sponges, this work establishes a new framework for architected cementitious composites (ACC) through multi‐material additive manufacturing (MMAM) process. The integration of mortar and elastomer phases into layered architectures enables synergistic toughening mechanisms, including
Aimane Najmeddine +5 more
wiley +1 more source
A Unified, Threat-Validated Taxonomy for Hardware Security Assurance
Hardware systems are foundational to critical infrastructure, embedded devices, and consumer products, making robust security assurance essential. However, existing hardware security standards remain fragmented, inconsistent in scope, and difficult to ...
Shao-Fang Wen, Arvind Sharma
doaj +1 more source

