Results 71 to 80 of about 8,384 (195)
Identity theft hits the UK [PDF]
Bruce Grant-Braham examines the latest hospitality information technology ...
Grant-Braham, Bruce
core
Rapid digital adoption in Nigeria has been accompanied by rising cybercrime; a 2021 Sophos survey found 71% of Nigerian organizations experienced cyberattacks, 44% of which paid ransoms averaging USD 3.43 million. The integration of emerging technologies (artificial intelligence, blockchain, Internet of Things, and 5G) offers transformative ...
Goddy Uwa Osimen +5 more
wiley +1 more source
TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents [PDF]
Recent work has identified that classification models implemented as neural networks are vulnerable to data-poisoning and Trojan attacks at training time.
Jha, Susmit +3 more
core
A proactive, predictive, and integrative framework that integrates multi‐omics innovations with ecological modeling and big data analytics to guide adaptive interventions and governance in invasive species management. By integrating multi‐omics insights with advanced ecological modeling, remote sensing, artificial intelligence, and cross‐disciplinary ...
Aibin Zhan
wiley +1 more source
DISTROY: Detecting Integrated Circuit Trojans with Compressive Measurements [PDF]
Detecting Trojans in an integrated circuit (IC) is an important but hard problem. A Trojan is malicious hardware it can be extremely small in size and dormant until triggered by some unknown circuit state.
Gwon, Youngjune Lee +2 more
core +1 more source
Hardware Security in the Connected World
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee +4 more
wiley +1 more source
Methods of Repairing Virus Infected Files, A TRIZ based Analysis
Most viruses are capable of fixing up the first few bytes and repair the original program because they have to return the control back to the infected program. This fact is used by a heuristic cleaner to clean the infected file. As the virus knows how to
Mishra, Umakant
core +1 more source
Deep Space Network Radio Science and Ground‐Based Planetary Radar in the Next Decade
Abstract The Deep Space Network (DSN) has been a core operational element of NASA's crewed and robotic exploration of the Solar System since the early 1960s. The primary role of the DSN has been to acquire telemetry and navigation data, but over the years, its radiometric and radar capabilities have expanded to form a system for obtaining unique ...
R. S. Park +13 more
wiley +1 more source
Gate-Level Hardware Trojan Detection Method for Graph Neural Networks Based on Controllability Metrics [PDF]
With the continuous increase in globalization, third-party Intellectual Property (IP) core applications have become increasingly widespread. The gradual maturity of hardware Trojan attack technology enables the implantation of hardware Trojan in the chip
Yang ZHANG, Chang LIU, Shaoqing LI
doaj +1 more source
Hardware Trojan Detection Using Controlled Circuit Aging
This paper reports a novel approach that uses transistor aging in an integrated circuit (IC) to detect hardware Trojans. When a transistor is aged, it results in delays along several paths of the IC.
Virinchi Roy Surabhi +6 more
doaj +1 more source

