Results 71 to 80 of about 9,623 (197)
Rapid digital adoption in Nigeria has been accompanied by rising cybercrime; a 2021 Sophos survey found 71% of Nigerian organizations experienced cyberattacks, 44% of which paid ransoms averaging USD 3.43 million. The integration of emerging technologies (artificial intelligence, blockchain, Internet of Things, and 5G) offers transformative ...
Goddy Uwa Osimen +5 more
wiley +1 more source
TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents [PDF]
Recent work has identified that classification models implemented as neural networks are vulnerable to data-poisoning and Trojan attacks at training time.
Jha, Susmit +3 more
core
Using quantum key distribution for cryptographic purposes: a survey
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone
, +23 more
core +3 more sources
Hardware property checker for run-time Hardware Trojan detection [PDF]
Nowadays, Hardware Trojans (HTs) become a real threat because of IC design and fabrication outsourcing trend. In the state of the art, many efforts were devoted to counter this threat, especially at netlist level. However, some clever HTs are actually a combination between a hardware and a software vulnerability, which, together, allow an exploitation.
Xuan Thuy Ngo +4 more
openaire +1 more source
A proactive, predictive, and integrative framework that integrates multi‐omics innovations with ecological modeling and big data analytics to guide adaptive interventions and governance in invasive species management. By integrating multi‐omics insights with advanced ecological modeling, remote sensing, artificial intelligence, and cross‐disciplinary ...
Aibin Zhan
wiley +1 more source
An Unsupervised Detection Approach for Hardware Trojans
With the booming development of the cyber-physical system, human society is much more dependent on information technology. Unfortunately, like software, hardware is not trusted at all, due to so many third parties involved in the separated integrated ...
Chen Dong +5 more
doaj +1 more source
Dataset for hardware Trojan detection
Nowadays, cloud services rely extensively on the use of virtual machines to enforce security by isolation. However, hardware trojan attacks break this assumption. Within these attacks, cache side-channel attacks such as Spectre and Meltdown are the focus of this work.
openaire +1 more source
Hardware Security in the Connected World
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee +4 more
wiley +1 more source
Deep Space Network Radio Science and Ground‐Based Planetary Radar in the Next Decade
Abstract The Deep Space Network (DSN) has been a core operational element of NASA's crewed and robotic exploration of the Solar System since the early 1960s. The primary role of the DSN has been to acquire telemetry and navigation data, but over the years, its radiometric and radar capabilities have expanded to form a system for obtaining unique ...
R. S. Park +13 more
wiley +1 more source
Greening the Gulf? Renewables, Fossil Capitalism and the ‘East–East’ Axis of World Energy
ABSTRACT This article examines the place of the Gulf Cooperation Council states in the global energy transition, with a focus on the recent and rapid expansion of renewable energy in the region. It argues that much like at the global scale, the energy transition in the Gulf is an additive process, one that superimposes renewable energy on growing ...
Adam Hanieh
wiley +1 more source

