Results 61 to 70 of about 30,050 (262)

A Covert Data Transport Protocol

open access: yes, 2017
Both enterprise and national firewalls filter network connections. For data forensics and botnet removal applications, it is important to establish the information source.
Brooks, Richard   +4 more
core   +1 more source

Asymmetry of the Ferroelectric Phase Transition in BaTiO3

open access: yesAdvanced Materials, EarlyView.
Phase transitions are typically assumed to behave identically in forward and reverse. This work shows that in the ferroelectric material barium titanate this is not true: heating drives an abrupt, first‐order jump, while cooling gives a smooth, continuous change.
Asaf Hershkovitz   +14 more
wiley   +1 more source

Evaluation of Local Security Event Management System vs. Standard Antivirus Software

open access: yesApplied Sciences, 2022
The detection and classification of threats in computer systems has been one of the main problems researched in Cybersecurity. As technology evolves, the tactics employed by adversaries have also become more sophisticated to evade detection systems.
Antonio Pérez-Sánchez, Rafael Palacios
doaj   +1 more source

Vectorization, Obfuscation and P4 LLVM Tool-chain [PDF]

open access: yes, 2018
This thesis broadly focuses on three different areas: Loop Vectorization, Code Obfuscation, and P4LLVM compiler. The work in Loop vectorization starts with a comparison of Auto-vectorization of GCC, ICC and LLVM compilers and show their strengths and ...
Kumar, Dangeti Tharun   +1 more
core  

A Privacy-Preserving QoS Prediction Framework for Web Service Recommendation

open access: yes, 2015
QoS-based Web service recommendation has recently gained much attention for providing a promising way to help users find high-quality services. To facilitate such recommendations, existing studies suggest the use of collaborative filtering techniques for
He, Pinjia   +3 more
core   +1 more source

Programmable Dimensional Lithography with Digital Micromirror Devices for Multifunctional Microarchitectures

open access: yesAdvanced Materials Technologies, EarlyView.
This review explores recent advances in digital micromirror device (DMD)‐based lithography, focusing on its programmable light modulation, multi‐material compatibility, and dimensional patterning strategies. It highlights innovations from optical system design to materials integration and multifunctional applications, positioning DMD lithography as a ...
Yubin Lee   +5 more
wiley   +1 more source

A Security Analysis of Circuit Clock Obfuscation

open access: yesCryptography, 2022
Key-based circuit obfuscation or logic-locking is a technique that can be used to hide the full design of an integrated circuit from an untrusted foundry or end-user. The technique is based on creating ambiguity in the original circuit by inserting “key”
Rajesh Datta   +3 more
doaj   +1 more source

Lightweight obfuscation techniques for modeling attacks resistant PUFs [PDF]

open access: yes2017 IEEE 2nd International Verification and Security Workshop (IVSW), 2017
Building lightweight security for low-cost pervasive devices is a major challenge considering the design requirements of a small footprint and low power consumption. Physical Unclonable Functions (PUFs) have emerged as a promising technology to provide a low-cost authentication for such devices. By exploiting intrinsic manufacturing process variations,
Mispan, Mohd Syafiq   +2 more
openaire   +2 more sources

Soybean Auxin Transporter PIN3 Regulates Nitrate Acquisition to Improve Nitrogen Use and Seed Traits

open access: yesAdvanced Science, EarlyView.
Xu et al. discovers that switching off auxin transporters in soybean, PIN3a and PIN3b, disrupts auxin flow; this triggers ARF‐STF3/4 signal cascade to activate the nitrate importer NPF2.13 and soil nitrogen acquisition. Multi‐year field trials show edited soybeans maintain yield with higher oil content, offering a potential genetic route to improve ...
Huifang Xu   +16 more
wiley   +1 more source

PhishDef: URL Names Say It All

open access: yes, 2010
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identify phishing URLs.
Faloutsos, Michalis   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy