Results 71 to 80 of about 118,403 (212)
A Risk Manager for Intrusion Tolerant Systems: Enhancing HAL 9000 With New Scoring and Data Sources
ABSTRACT Background Intrusion Tolerant Systems (ITS) aim to maintain system security despite adversarial presence by limiting the impact of successful attacks. Current ITS risk managers rely heavily on public databases like NVD and Exploit DB, which suffer from long delays in vulnerability evaluation, reducing system responsiveness. Objective This work
Tadeu Freitas +6 more
wiley +1 more source
A depth–spatial alignment method for multi‐source point clouds on large‐scale construction sites
Abstract Three‐dimensional (3D) site models form the digital foundation for modern construction management. However, creating these models from multi‐source imagery presents two key challenges: accurately georeferencing camera poses during wide‐view acquisition and precisely aligning multiple point clouds that possess non‐uniform accuracy.
Tao Zhong +5 more
wiley +1 more source
Scalable and Sustainable Deep Learning via Randomized Hashing
Current deep learning architectures are growing larger in order to learn from complex datasets. These architectures require giant matrix multiplication operations to train millions of parameters.
Chen Wenlin +8 more
core +1 more source
Advanced Microfluidics for Single Cell‐Based Cancer Research
Cutting‐edge microfluidic platforms are transforming single‐cell cancer research. This review highlights advanced technologies, from droplet microfluidics to tumour‐chips, that enable functional and spatial single‐cell analyses. By integrating biosensing, immune components, and patient‐derived materials, these systems offer new insights into tumour ...
Adriana Carneiro +10 more
wiley +1 more source
Key recycling in authentication
In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad.
Portmann, Christopher
core +1 more source
A CMOS‐compatible flash memory structure with multi‐level programming produces reliable and reproducible physically unclonable functions (PUFs) for secure IoT applications. Device‐specific variations in flat‐band voltage enable scalable key generation without standby power.
Kyumin Sim +6 more
wiley +1 more source
Continuum armed bandit problem of few variables in high dimensions
We consider the stochastic and adversarial settings of continuum armed bandits where the arms are indexed by [0,1]^d. The reward functions r:[0,1]^d -> R are assumed to intrinsically depend on at most k coordinate variables implying r(x_1,..,x_d) = g(x_ ...
Gärtner, Bernd, Tyagi, Hemant
core +1 more source
This study introduces a fusion filtering‐based method to accurately extract spectral trajectories of non‐repetitive transient weak signals in industrial control networks, enhancing signal clarity and reliability across multiple frequency bands. ABSTRACT In response to the problem of difficulty in accurately extracting spectral trajectories of multi ...
Changzhong Gao +4 more
wiley +1 more source
ABSTRACT A key application of phylogenetics in ecological studies is identifying unknown sequences with respect to known ones. This goal can be formalised as assigning taxonomic labels or inserting sequences into a reference phylogenetic tree (phylogenetic placement). Much attention has been paid to the phylogenetic placement of short fragments used in
Eleonora Rachtman +2 more
wiley +1 more source

