Results 151 to 160 of about 7,601 (189)
Some of the next articles are maybe not open access.
Unifying Freedom and Separation for Tight Probing-Secure Composition
2023The masking countermeasure is often analyzed in the probing model. Proving the probing security of large circuits at high masking orders is achieved by composing gadgets that satisfy security definitions such as non-interference (NI), strong non-interference (SNI) or free SNI.
Belaïd, Sonia+3 more
openaire +1 more source
PIT: A Probe Into Internet of Things by Comprehensive Security Analysis
2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2019One of the major issues which are hindering widespread and seamless adoption of Internet of Thing (IoT) is security. The IoT devices are vulnerable and susceptible to attacks which became evident from a series of recent large-scale distributed denial-of-service (DDoS) attacks, leading to substantial business and financial losses.
Vinay Sachidananda+3 more
openaire +2 more sources
Probing the Opioidergic Basis of Attachment (In)security
Biological Psychiatry: Cognitive Neuroscience and Neuroimaging, 2021Jennifer A. Bartz, Kristina Tchalova
openaire +3 more sources
Leveraging Probe Data to Assess Security Checkpoint Wait Times
Transportation Research Record: Journal of the Transportation Research Board, 2013The process of traveling to an airport, passing through various processes, and ultimately departing the airport involves many activities. This paper focuses on the use of probe data obtained from phones with discoverable Bluetooth devices to sample the time needed for passengers to travel from the nonsterile to the sterile side of an airport facility.
Darcy M. Bullock+2 more
openaire +2 more sources
The art of constructing (in)security: probing rhetorical strategies of securitisation
Journal of International Relations and Development, 2017Scholars advocating a sociological view of securitisation have criticised the Copenhagen school for its overemphasis on the grammar of security and its neglect of the social situatedness of securitisation. Accordingly, these critics have also pointed to the relevance of rhetorical strategy, that is, how agents tailor their securitising moves to ...
openaire +2 more sources
Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges
IEEE Communications Surveys and Tutorials, 2021Bo-chao Cheng+2 more
exaly
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
IEEE Communications Surveys and Tutorials, 2020Abdulla Al-ali, Amr Mohamed, Ihsan Ali
exaly
A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G
IEEE Communications Surveys and Tutorials, 2022Hongzhi Guo, Jingyi Li, Jiajia Liu
exaly
Machine Learning in IoT Security: Current Solutions and Future Challenges
IEEE Communications Surveys and Tutorials, 2020Ekram Hossain+2 more
exaly
A Survey on Metaverse: Fundamentals, Security, and Privacy
IEEE Communications Surveys and Tutorials, 2023Yuntao Wang, Zhou Su, Xiaofeng Tao
exaly