Results 61 to 70 of about 462,135 (294)

BEANIE – A 32-bit Cipher for Cryptographic Mitigations Against Software Attacks

open access: yesIACR Transactions on Symmetric Cryptology
In modern CPU architectures, various security features to mitigate software attacks can be found. Examples of such features are logical isolation, memory tagging or shadow stacks. Basing such features on cryptographic isolation instead of logical checks
Simon Gerhalter   +9 more
doaj   +1 more source

Optimised Levenshtein centroid cross‐layer defence for multi‐hop cognitive radio networks

open access: yesIET Communications, 2021
Cognitive radio networks (CRN) make use of dynamic spectrum access to communicate opportunistically. Unlicensed users severely affect the spectrum sensing outcomes in CRN. Primary user emulation attack (PUEA) and spectrum sensing data falsification (SSDF)
Davanam Ganesh   +2 more
doaj   +1 more source

Two Decades of Maude [PDF]

open access: yes, 2015
This paper is a tribute to José Meseguer, from the rest of us in the Maude team, reviewing the past, the present, and the future of the language and system with which we have been working for around two decades under his leadership.
Clavel, Manuel   +6 more
core   +1 more source

POM‐Based Water Splitting Catalyst Under Acid Conditions Driven by Its Assembly on Carbon Nanotubes

open access: yesAdvanced Materials, EarlyView.
A newly‐engineered POM‐based electrocatalyst incorporating non‐innocent counter cations exhibits fast kinetics for either the OER or HER under strongly acidic conditions (1 m H2SO4), depending on whether it is assembled on carbon nanotubes (1@CNT) or physically mixed with them (1/CNT). In water‐splitting tests using a two‐electrode setup, these systems
Eugenia P. Quirós‐Díez   +8 more
wiley   +1 more source

Network Topology Mutation as Moving Target Defense for Corporate Networks [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2019
The paper introduces a topology mutation – the novel concept in Moving Target Defense (MTD). MTD is a new technique that represents a significant shift in cyber defense.
Mariusz Rawski
doaj   +1 more source

A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL

open access: yes, 2019
Split manufacturing was introduced as an effective countermeasure against hardware-level threats such as IP piracy, overbuilding, and insertion of hardware Trojans.
Knechtel, Johann   +3 more
core   +1 more source

Azaporphyrinoid‐Based Photo‐ and Electroactive Architectures for Advanced Functional Materials

open access: yesAdvanced Materials, EarlyView.
A long‐standing collaboration between the Torres and Guldi groups has yielded diverse azaporphyrinoid‐based donor‐acceptor nanohybrids with promising applications in solar energy conversion. This conspectus highlights key molecular platforms and structure‐function relationships that govern light and charge management, supporting the rational design of ...
Jorge Labella   +3 more
wiley   +1 more source

Towards a Realistic Model for Failure Propagation in Interdependent Networks

open access: yes, 2015
Modern networks are becoming increasingly interdependent. As a prominent example, the smart grid is an electrical grid controlled through a communications network, which in turn is powered by the electrical grid.
Conti, Mauro   +3 more
core   +1 more source

Hydro‐Torsional Compaction for Scalable Production of Aramid Nanofiber Threads with Densely Assembled Double‐Helical Nanostructures

open access: yesAdvanced Materials, EarlyView.
This paper introduces a scalable strategy for producing hierarchically aligned PBDT threads through wet‐spinning, controlled drawing, and post‐spinning twisting. Ionic crosslinking reinforces structural stability, whereas alignment and twisting optimize mechanical performance.
Woojae Jeong   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy