Results 81 to 90 of about 139,929 (306)
A Model-Based Approach to Security Analysis for Cyber-Physical Systems
Evaluating the security of cyber-physical systems throughout their life cycle is necessary to assure that they can be deployed and operated in safety-critical applications, such as infrastructure, military, and transportation.
Bakirtzis, Georgios +3 more
core +1 more source
Tunable Applicator for Microneedle‐Based Medical Devices
This paper presents a simple, low‐cost tunable applicator (TAPP) for microneedle array patches that uses a material‐agnostic controlled‐fracture mechanism to ensure reliable skin penetration and uniform array engagement. The scalable, modular design is compatible with injection molding and 3D printing, can be integrated directly into patches, and is ...
Dan Ilyn +9 more
wiley +1 more source
Due to the issues of low throughput and low time synchronization accuracy when traditional power timing terminals transmit communication data, a power timing terminal for novel power system communication network security based on MQTT (message queuing ...
LI Yifan +5 more
doaj +1 more source
In this paper, we present an instruction set coprocessor architecture for lattice-based cryptography and implement the module lattice-based post-quantum key encapsulation mechanism (KEM) Saber as a case study.
Sujoy Sinha Roy, Andrea Basso
doaj +1 more source
Random Number Generation from a Secure Photonic Physical Unclonable Hardware Module [PDF]
In this work, a photonic physical unclonable function module, based on an optical waveguide, is demonstrated. The physical scrambling mechanism is based on the random and complex coherent interference of high order optical transverse modes. The proposed scheme allows the generation of random bit- strings, through a simple wavelength tuning of the laser
Akriotou, M. +5 more
openaire +2 more sources
KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels
Commodity OS kernels have broad attack surfaces due to the large code base and the numerous features such as device drivers. For a real-world use case (e.g., an Apache Server), many kernel services are unused and only a small amount of kernel code is ...
A Kurmus +6 more
core +1 more source
ABSTRACT Quantifying oral polymorphonuclear neutrophils (oPMNs) is a clinically validated approach for assessing periodontal inflammation. However, current methods, such as manual hemocytometry and flow cytometry, are time‐consuming (>3 h), require invasive sampling, and depend on staining and complex instrumentation, making them unsuitable for point ...
Mohsen Hassani +9 more
wiley +1 more source
TCG based approach for secure management of virtualized platforms: state-of-the-art [PDF]
There is a strong trend shift in the favor of adopting virtualization to get business benefits. The provisioning of virtualized enterprise resources is one kind of many possible scenarios.
Aslam, Mudassar, Gehrmann, Christian
core
Collision‐Resilient Winged Drones Enabled by Tensegrity Structures
Based on structures of birds such as the woodpeck, this article presents the collision‐resilient aerial robot, SWIFT. SWIFT leverages tensegrity structures in the fuselage and wings which allow it to undergo large deformations in a crash, without sustaining damage. Experiments show that SWIFT can reduce impact forces by 70% over conventional structures.
Omar Aloui +5 more
wiley +1 more source
The performance of any elliptic curve cryptography hardware accelerator significantly relies on the efficiency of the underlying point multiplication (PM) architecture.
Md Rownak Hossain +7 more
doaj +1 more source

