Results 61 to 70 of about 13,174 (191)

Integrating Digital Twins, Data Management and Artificial Intelligence for Predictive Maintenance in Aviation: A Comprehensive Review

open access: yesDigital Twins and Applications, Volume 3, Issue 1, January/December 2026.
This study provides a comprehensive review of predictive maintenance in aviation, emphasising the integration of digital twin technology, engineering data management and AI algorithms. It highlights how data‐driven approaches enhance safety, reduce costs and improve aircraft reliability through real‐time monitoring, fault detection and remaining useful
Saber Mehdipour   +6 more
wiley   +1 more source

Real-time detection and resection of sentinel lymph node metastasis in breast cancer through a rare earth nanoprobe based NIR-IIb fluorescence imaging

open access: yesMaterials Today Bio
Sentinel lymph node (SLN) biopsy is a commonly employed procedure for the routine assessment of axillary involvement in patients with breast cancer. Nevertheless, conventional SLN mapping cannot reliably distinguish the presence and absence of metastatic
Zuo Yang   +9 more
doaj   +1 more source

Enhancing E‐Commerce Security Based on Involution Function Using Twin Key AES Cipher

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
In the realm of surging e‐commerce data and increasing digital transactions, ensuring end‐to‐end security is paramount to protect sensitive information and maintain user trust. The Advanced Encryption Standard (AES), a cornerstone of network security, relies on symmetric key encryption for secure communication.
Biresh Kumar   +11 more
wiley   +1 more source

Selection of EAP-authentication methods in WLANs [PDF]

open access: yes, 2007
IEEE 802.1X is a key part of IEEE802.11i. By employing Extensible Authentication Protocol (EAP) it supports a variety of upper layer authentication methods each with different benefits and drawbacks.
Ali, KM, Owens, TJ
core  

Ghera: A Repository of Android App Vulnerability Benchmarks

open access: yes, 2017
Security of mobile apps affects the security of their users. This has fueled the development of techniques to automatically detect vulnerabilities in mobile apps and help developers secure their apps; specifically, in the context of Android platform due ...
Arzt Steven   +4 more
core   +1 more source

MA‐LCPPA: A Multi‐Aggregator Lattice‐Based Conditional Privacy‐Preserving Authentication Scheme for Scalable and Quantum‐Secure VANETs

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley   +1 more source

Minimally invasive tubular versus conventional open microsurgery of the lumbar spine for degenerative disorders

open access: yesThe Egyptian Journal of Neurology, Psychiatry and Neurosurgery
Background The aim of this study was to investigate patient-related variables, hospital-related variables and surgeon-related variables of minimally invasive tubular microsurgery (MITM) compared to conventional open microsurgery (COMS) in patients ...
Michal Ziga   +7 more
doaj   +1 more source

Lightweight Anomaly-Based Detection Using Cuckoo Search Algorithm and Decision Tree to Mitigate Man-in-the-Middle Attacks in DNS

open access: yesApplied Sciences
As technology advances, the services provided by domain servers require new innovative techniques that can be optimized for frequent changes. Man-in-the-Middle (MitM) attacks on Domain Name Servers (DNS) pose a security threat, enabling attackers to ...
Ramahlapane Lerato Moila   +1 more
doaj   +1 more source

Sieve-in-the-Middle: Improved MITM Attacks [PDF]

open access: yes, 2013
This paper presents a new generic technique, named sieve-in-the-middle, which improves meet-in-the-middle attacks in the sense that it provides an attack on a higher number of rounds. Instead of selecting the key candidates by searching for a collision in an intermediate state which can be computed forwards and backwards, we look for the existence of ...
Canteaut, Anne   +2 more
openaire   +1 more source

Resisting Quantum Key Distribution Attacks Using Quantum Machine Learning

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
Quantum key distribution (QKD) promises secure communication but remains vulnerable to advanced quantum attacks. We propose a hybrid quantum long short‐term memory (QLSTM) model that combines quantum‐enhanced learning with classical deep learning to detect attacks such as photon‐number splitting, Trojan‐Horse and detector blinding.
Ali Al‐Kuwari   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy