Results 61 to 70 of about 13,174 (191)
This study provides a comprehensive review of predictive maintenance in aviation, emphasising the integration of digital twin technology, engineering data management and AI algorithms. It highlights how data‐driven approaches enhance safety, reduce costs and improve aircraft reliability through real‐time monitoring, fault detection and remaining useful
Saber Mehdipour +6 more
wiley +1 more source
Sentinel lymph node (SLN) biopsy is a commonly employed procedure for the routine assessment of axillary involvement in patients with breast cancer. Nevertheless, conventional SLN mapping cannot reliably distinguish the presence and absence of metastatic
Zuo Yang +9 more
doaj +1 more source
Enhancing E‐Commerce Security Based on Involution Function Using Twin Key AES Cipher
In the realm of surging e‐commerce data and increasing digital transactions, ensuring end‐to‐end security is paramount to protect sensitive information and maintain user trust. The Advanced Encryption Standard (AES), a cornerstone of network security, relies on symmetric key encryption for secure communication.
Biresh Kumar +11 more
wiley +1 more source
Selection of EAP-authentication methods in WLANs [PDF]
IEEE 802.1X is a key part of IEEE802.11i. By employing Extensible Authentication Protocol (EAP) it supports a variety of upper layer authentication methods each with different benefits and drawbacks.
Ali, KM, Owens, TJ
core
Ghera: A Repository of Android App Vulnerability Benchmarks
Security of mobile apps affects the security of their users. This has fueled the development of techniques to automatically detect vulnerabilities in mobile apps and help developers secure their apps; specifically, in the context of Android platform due ...
Arzt Steven +4 more
core +1 more source
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley +1 more source
Background The aim of this study was to investigate patient-related variables, hospital-related variables and surgeon-related variables of minimally invasive tubular microsurgery (MITM) compared to conventional open microsurgery (COMS) in patients ...
Michal Ziga +7 more
doaj +1 more source
As technology advances, the services provided by domain servers require new innovative techniques that can be optimized for frequent changes. Man-in-the-Middle (MitM) attacks on Domain Name Servers (DNS) pose a security threat, enabling attackers to ...
Ramahlapane Lerato Moila +1 more
doaj +1 more source
Sieve-in-the-Middle: Improved MITM Attacks [PDF]
This paper presents a new generic technique, named sieve-in-the-middle, which improves meet-in-the-middle attacks in the sense that it provides an attack on a higher number of rounds. Instead of selecting the key candidates by searching for a collision in an intermediate state which can be computed forwards and backwards, we look for the existence of ...
Canteaut, Anne +2 more
openaire +1 more source
Resisting Quantum Key Distribution Attacks Using Quantum Machine Learning
Quantum key distribution (QKD) promises secure communication but remains vulnerable to advanced quantum attacks. We propose a hybrid quantum long short‐term memory (QLSTM) model that combines quantum‐enhanced learning with classical deep learning to detect attacks such as photon‐number splitting, Trojan‐Horse and detector blinding.
Ali Al‐Kuwari +4 more
wiley +1 more source

