Results 61 to 70 of about 817,598 (242)

Malware detection techniques for mobile devices

open access: yes, 2017
Mobile devices have become very popular nowadays, due to its portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications
Amro, Bela
core   +1 more source

SKE2SG: A Secure Key Establishment Scheme for Smart Grid Cyber‐Physical Systems Based on Elliptic Curve Cryptography

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
Recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication in AMI, asserting their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment.
Ahmad Rahdari, Bahareh Akhbari
wiley   +1 more source

A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF]

open access: yes, 2017
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly defined, designed and fabricated in different premises across the world. This reduces production costs, but also exposes ICs to supply chain attacks, where insiders
Cerulli, Andrea   +5 more
core   +1 more source

CERT strategy to deal with phishing attacks

open access: yes, 2017
Every day, internet thieves employ new ways to obtain personal identity people and get access to their personal information. Phishing is a somehow complex method that has recently been considered by internet thieves.The present study aims to explain ...
Sedaghat, Shahrzad
core   +1 more source

Cybersecurity Driven Quantum Digital Twin for Proactive Threat Reversal in Open RAN

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
This paper presents a novel cybersecurity‐driven quantum digital twin (CQDT) architecture for proactive defence in 6G Open RAN. By integrating quantum observables and reinforcement learning, the framework maintains high fidelity and suppresses entropy under adversarial CPTP noise. CQDT achieves real‐time adaptation with sub‐20 ms latency, meeting URLLC
Yassir Al‐Karawi   +2 more
wiley   +1 more source

DISTROY: Detecting Integrated Circuit Trojans with Compressive Measurements [PDF]

open access: yes, 2012
Detecting Trojans in an integrated circuit (IC) is an important but hard problem. A Trojan is malicious hardware it can be extremely small in size and dormant until triggered by some unknown circuit state.
Gwon, Youngjune Lee   +2 more
core   +1 more source

A Survey of Techniques for Improving Security of GPUs

open access: yes, 2018
Graphics processing unit (GPU), although a powerful performance-booster, also has many security vulnerabilities. Due to these, the GPU can act as a safe-haven for stealthy malware and the weakest `link' in the security `chain'.
Abhinaya, S. B.   +3 more
core   +1 more source

Resisting Quantum Key Distribution Attacks Using Quantum Machine Learning

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
Quantum key distribution (QKD) promises secure communication but remains vulnerable to advanced quantum attacks. We propose a hybrid quantum long short‐term memory (QLSTM) model that combines quantum‐enhanced learning with classical deep learning to detect attacks such as photon‐number splitting, Trojan‐Horse and detector blinding.
Ali Al‐Kuwari   +4 more
wiley   +1 more source

Securing library information system: Vulnerabilities and threats [PDF]

open access: yes, 2010
Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet.
Husin, Mohd Zabidin   +3 more
core  

Quantum Key Distribution Networks Design: Overview and Challenges

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
This paper explores the potential of using established QKD network design techniques in the context of quantum key distribution, which is based on the principles of quantum mechanics. ABSTRACT Quantum cryptography has increasingly attracted interest from both industry and academia for its potential in real‐world applications.
Pankaj Kumar   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy