Results 71 to 80 of about 9,623 (197)

Balancing Innovation With Cybersecurity: Exploring the Role of Emerging Technologies in Digital Transformation for Socioeconomic Development in Nigeria

open access: yesHuman Behavior and Emerging Technologies, Volume 2026, Issue 1, 2026.
Rapid digital adoption in Nigeria has been accompanied by rising cybercrime; a 2021 Sophos survey found 71% of Nigerian organizations experienced cyberattacks, 44% of which paid ransoms averaging USD 3.43 million. The integration of emerging technologies (artificial intelligence, blockchain, Internet of Things, and 5G) offers transformative ...
Goddy Uwa Osimen   +5 more
wiley   +1 more source

TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents [PDF]

open access: yes, 2019
Recent work has identified that classification models implemented as neural networks are vulnerable to data-poisoning and Trojan attacks at training time.
Jha, Susmit   +3 more
core  

Using quantum key distribution for cryptographic purposes: a survey

open access: yes, 2014
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone
,   +23 more
core   +3 more sources

Hardware property checker for run-time Hardware Trojan detection [PDF]

open access: yes2015 European Conference on Circuit Theory and Design (ECCTD), 2015
Nowadays, Hardware Trojans (HTs) become a real threat because of IC design and fabrication outsourcing trend. In the state of the art, many efforts were devoted to counter this threat, especially at netlist level. However, some clever HTs are actually a combination between a hardware and a software vulnerability, which, together, allow an exploitation.
Xuan Thuy Ngo   +4 more
openaire   +1 more source

Multi‐Omics‐Driven Adaptive Management of Biological Invasions: Toward a Proactive, Predictive, and Integrative Framework

open access: yesBiological Diversity, Volume 2, Issue 4, Page 163-192, December 2025.
A proactive, predictive, and integrative framework that integrates multi‐omics innovations with ecological modeling and big data analytics to guide adaptive interventions and governance in invasive species management. By integrating multi‐omics insights with advanced ecological modeling, remote sensing, artificial intelligence, and cross‐disciplinary ...
Aibin Zhan
wiley   +1 more source

An Unsupervised Detection Approach for Hardware Trojans

open access: yesIEEE Access, 2020
With the booming development of the cyber-physical system, human society is much more dependent on information technology. Unfortunately, like software, hardware is not trusted at all, due to so many third parties involved in the separated integrated ...
Chen Dong   +5 more
doaj   +1 more source

Dataset for hardware Trojan detection

open access: yes, 2022
Nowadays, cloud services rely extensively on the use of virtual machines to enforce security by isolation. However, hardware trojan attacks break this assumption. Within these attacks, cache side-channel attacks such as Spectre and Meltdown are the focus of this work.
openaire   +1 more source

Hardware Security in the Connected World

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 3, September 2025.
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee   +4 more
wiley   +1 more source

Deep Space Network Radio Science and Ground‐Based Planetary Radar in the Next Decade

open access: yesRadio Science, Volume 60, Issue 7, July 2025.
Abstract The Deep Space Network (DSN) has been a core operational element of NASA's crewed and robotic exploration of the Solar System since the early 1960s. The primary role of the DSN has been to acquire telemetry and navigation data, but over the years, its radiometric and radar capabilities have expanded to form a system for obtaining unique ...
R. S. Park   +13 more
wiley   +1 more source

Greening the Gulf? Renewables, Fossil Capitalism and the ‘East–East’ Axis of World Energy

open access: yesDevelopment and Change, Volume 56, Issue 4-5, Page 957-981, July-September 2025.
ABSTRACT This article examines the place of the Gulf Cooperation Council states in the global energy transition, with a focus on the recent and rapid expansion of renewable energy in the region. It argues that much like at the global scale, the energy transition in the Gulf is an additive process, one that superimposes renewable energy on growing ...
Adam Hanieh
wiley   +1 more source

Home - About - Disclaimer - Privacy