Results 61 to 70 of about 30,154 (232)
A Covert Data Transport Protocol
Both enterprise and national firewalls filter network connections. For data forensics and botnet removal applications, it is important to establish the information source.
Brooks, Richard +4 more
core +1 more source
Postsynaptic Complexin Mediates Constitutive Exocytosis of Nicotinic Acetylcholine Receptor
Beyond its established presynaptic role, complexin is identified as a postsynaptic regulator of neurotransmitter receptor trafficking. By promoting constitutive and activity‐dependent exocytosis of nicotinic acetylcholine receptors, complexin controls spontaneous synaptic signaling at the C.
Ya Wang +4 more
wiley +1 more source
Tis-Bad: A Time Series-Based Deobfuscation Algorithm
Location-Based Services (LBSs) have brought along many benefitsto users and service providers in terms of improved quality of existing services and a better user experience.
A Labrador +4 more
doaj +1 more source
It is reported that the unconventional spin Hall magnetoresistance generated from nonrelativistic spin currents in RuO2 is capable of accurately detecting spin current polarization and disentangling the T̂$\hat{T}$‐odd and T̂$\hat{T}$‐even components of a spin current.
Chang Pan +10 more
wiley +1 more source
Control Strategies in Guanine Biocrystallization
Biological guanine crystals produce spectacular photonic phenomena in animals and hold great promise as new, sustainable optical materials. We review how organisms precisely control the structure, morphologies, and resulting optical properties of these crystals using a set of ingenious ‘design’ strategies, including control of pH, template‐directed ...
Shashanka S. Indri +2 more
wiley +2 more sources
Design Protection Using Logic Encryption and Scan-Chain Obfuscation Techniques [PDF]
Due to increase in threats posed by offshore foundries, the companies outsourcing IPs are forced to protect their designs from the threats posed by the foundries. Few of the threats are IP piracy, counterfeiting and reverse engineering. To overcome these,
V.A. Deepak +2 more
doaj +1 more source
On the Anonymization of Differentially Private Location Obfuscation
Obfuscation techniques in location-based services (LBSs) have been shown useful to hide the concrete locations of service users, whereas they do not necessarily provide the anonymity.
duchi, montazeri, yang
core +1 more source
The Faraday Scalpel: Electrochemical Nerve Lesioning Mechanisms Studied in Invertebrate Models
Direct‐current produces nerve lesioning through discrete electrochemical reactions. Using hypoxia‐sensitive locust nerves and hypoxia‐tolerant leech nerves, we map three injury pathways: cathodic oxygen reduction, cathodic alkalization, and anodic chloride oxidation. These findings establish electrochemical lesioning—the “Faraday Scalpel”—as a precise,
Petra Ondráčková +5 more
wiley +1 more source
Identifying obfuscated code through graph-based semantic analysis of binary code
Protecting sensitive program content is a critical concern in various situations, ranging from legitimate use cases to unethical contexts. Obfuscation is one of the most used techniques to ensure such a protection.
Roxane Cohen +3 more
doaj +1 more source
A reconfigurable physical unclonable function is developed using CMOS‐integrated SOT‐MRAM chips, leveraging a dual‐pulse strategy and offering enhanced environmental robustness. A temperature‐compensation effect arising from the CMOS transistor and SOT‐MTJ is revealed and established as a key prerequisite for thermal resilience.
Min Wang +7 more
wiley +1 more source

