Results 61 to 70 of about 462,135 (294)
BEANIE – A 32-bit Cipher for Cryptographic Mitigations Against Software Attacks
In modern CPU architectures, various security features to mitigate software attacks can be found. Examples of such features are logical isolation, memory tagging or shadow stacks. Basing such features on cryptographic isolation instead of logical checks
Simon Gerhalter +9 more
doaj +1 more source
Optimised Levenshtein centroid cross‐layer defence for multi‐hop cognitive radio networks
Cognitive radio networks (CRN) make use of dynamic spectrum access to communicate opportunistically. Unlicensed users severely affect the spectrum sensing outcomes in CRN. Primary user emulation attack (PUEA) and spectrum sensing data falsification (SSDF)
Davanam Ganesh +2 more
doaj +1 more source
This paper is a tribute to José Meseguer, from the rest of us in the Maude team, reviewing the past, the present, and the future of the language and system with which we have been working for around two decades under his leadership.
Clavel, Manuel +6 more
core +1 more source
POM‐Based Water Splitting Catalyst Under Acid Conditions Driven by Its Assembly on Carbon Nanotubes
A newly‐engineered POM‐based electrocatalyst incorporating non‐innocent counter cations exhibits fast kinetics for either the OER or HER under strongly acidic conditions (1 m H2SO4), depending on whether it is assembled on carbon nanotubes (1@CNT) or physically mixed with them (1/CNT). In water‐splitting tests using a two‐electrode setup, these systems
Eugenia P. Quirós‐Díez +8 more
wiley +1 more source
Network Topology Mutation as Moving Target Defense for Corporate Networks [PDF]
The paper introduces a topology mutation – the novel concept in Moving Target Defense (MTD). MTD is a new technique that represents a significant shift in cyber defense.
Mariusz Rawski
doaj +1 more source
A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL
Split manufacturing was introduced as an effective countermeasure against hardware-level threats such as IP piracy, overbuilding, and insertion of hardware Trojans.
Knechtel, Johann +3 more
core +1 more source
Azaporphyrinoid‐Based Photo‐ and Electroactive Architectures for Advanced Functional Materials
A long‐standing collaboration between the Torres and Guldi groups has yielded diverse azaporphyrinoid‐based donor‐acceptor nanohybrids with promising applications in solar energy conversion. This conspectus highlights key molecular platforms and structure‐function relationships that govern light and charge management, supporting the rational design of ...
Jorge Labella +3 more
wiley +1 more source
Towards a Realistic Model for Failure Propagation in Interdependent Networks
Modern networks are becoming increasingly interdependent. As a prominent example, the smart grid is an electrical grid controlled through a communications network, which in turn is powered by the electrical grid.
Conti, Mauro +3 more
core +1 more source
Logical Inferentialism & Attacks on Classical Logic
28 ...
openaire +2 more sources
This paper introduces a scalable strategy for producing hierarchically aligned PBDT threads through wet‐spinning, controlled drawing, and post‐spinning twisting. Ionic crosslinking reinforces structural stability, whereas alignment and twisting optimize mechanical performance.
Woojae Jeong +5 more
wiley +1 more source

