Results 71 to 80 of about 8,384 (195)

Identity theft hits the UK [PDF]

open access: yes, 2006
Bruce Grant-Braham examines the latest hospitality information technology ...
Grant-Braham, Bruce
core  

Balancing Innovation With Cybersecurity: Exploring the Role of Emerging Technologies in Digital Transformation for Socioeconomic Development in Nigeria

open access: yesHuman Behavior and Emerging Technologies, Volume 2026, Issue 1, 2026.
Rapid digital adoption in Nigeria has been accompanied by rising cybercrime; a 2021 Sophos survey found 71% of Nigerian organizations experienced cyberattacks, 44% of which paid ransoms averaging USD 3.43 million. The integration of emerging technologies (artificial intelligence, blockchain, Internet of Things, and 5G) offers transformative ...
Goddy Uwa Osimen   +5 more
wiley   +1 more source

TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents [PDF]

open access: yes, 2019
Recent work has identified that classification models implemented as neural networks are vulnerable to data-poisoning and Trojan attacks at training time.
Jha, Susmit   +3 more
core  

Multi‐Omics‐Driven Adaptive Management of Biological Invasions: Toward a Proactive, Predictive, and Integrative Framework

open access: yesBiological Diversity, Volume 2, Issue 4, Page 163-192, December 2025.
A proactive, predictive, and integrative framework that integrates multi‐omics innovations with ecological modeling and big data analytics to guide adaptive interventions and governance in invasive species management. By integrating multi‐omics insights with advanced ecological modeling, remote sensing, artificial intelligence, and cross‐disciplinary ...
Aibin Zhan
wiley   +1 more source

DISTROY: Detecting Integrated Circuit Trojans with Compressive Measurements [PDF]

open access: yes, 2012
Detecting Trojans in an integrated circuit (IC) is an important but hard problem. A Trojan is malicious hardware it can be extremely small in size and dormant until triggered by some unknown circuit state.
Gwon, Youngjune Lee   +2 more
core   +1 more source

Hardware Security in the Connected World

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 3, September 2025.
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee   +4 more
wiley   +1 more source

Methods of Repairing Virus Infected Files, A TRIZ based Analysis

open access: yes, 2013
Most viruses are capable of fixing up the first few bytes and repair the original program because they have to return the control back to the infected program. This fact is used by a heuristic cleaner to clean the infected file. As the virus knows how to
Mishra, Umakant
core   +1 more source

Deep Space Network Radio Science and Ground‐Based Planetary Radar in the Next Decade

open access: yesRadio Science, Volume 60, Issue 7, July 2025.
Abstract The Deep Space Network (DSN) has been a core operational element of NASA's crewed and robotic exploration of the Solar System since the early 1960s. The primary role of the DSN has been to acquire telemetry and navigation data, but over the years, its radiometric and radar capabilities have expanded to form a system for obtaining unique ...
R. S. Park   +13 more
wiley   +1 more source

Gate-Level Hardware Trojan Detection Method for Graph Neural Networks Based on Controllability Metrics [PDF]

open access: yesJisuanji gongcheng
With the continuous increase in globalization, third-party Intellectual Property (IP) core applications have become increasingly widespread. The gradual maturity of hardware Trojan attack technology enables the implantation of hardware Trojan in the chip
Yang ZHANG, Chang LIU, Shaoqing LI
doaj   +1 more source

Hardware Trojan Detection Using Controlled Circuit Aging

open access: yesIEEE Access, 2020
This paper reports a novel approach that uses transistor aging in an integrated circuit (IC) to detect hardware Trojans. When a transistor is aged, it results in delays along several paths of the IC.
Virinchi Roy Surabhi   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy