Results 41 to 50 of about 3,209,774 (327)

Glitch-Resistant Masking Revisited

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Implementing the masking countermeasure in hardware is a delicate task. Various solutions have been proposed for this purpose over the last years: we focus on Threshold Implementations (TIs), Domain-Oriented Masking (DOM), the Unified Masking Approach ...
Thorben Moos   +3 more
doaj   +1 more source

Support Vector Machine for Network Intrusion and Cyber-Attack Detection [PDF]

open access: yes, 2017
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Cyber-security threats are a growing concern in networked environments.
Aparicio-Navarro, Francisco J.   +4 more
core   +2 more sources

Model fusion of deep neural networks for anomaly detection

open access: yesJournal of Big Data, 2021
Network Anomaly Detection is still an open challenging task that aims to detect anomalous network traffic for security purposes. Usually, the network traffic data are large-scale and imbalanced. Additionally, they have noisy labels.
Nouar AlDahoul   +2 more
doaj   +1 more source

RMD-QOSM: The NSIS Quality-of-Service Model for Resource Management in Diffserv [PDF]

open access: yes, 2010
This document describes a Next Steps in Signaling (NSIS) Quality-of- Service (QoS) Model for networks that use the Resource Management in Diffserv (RMD) concept.
Bader, A.   +4 more
core   +3 more sources

Threshold Implementations in Software: Micro-architectural Leakages in Algorithms

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the ...
John Gaspoz, Siemen Dhooghe
doaj   +1 more source

The Short Stint of a Coordinator: National Security Adviser H. R. McMaster in the Trump Administration

open access: yesEuropean Journal of American Studies, 2021
This article examines the role of former National Security Adviser H. R. McMaster in the Trump administration. The article discusses four major roles performed by the APNSA - administrator, coordinator, counselor, agent - and asserts that McMaster served
Mikael Blomdahl
doaj   +1 more source

Assessing the Security of Campus Networks: The Case of Seven Universities

open access: yesSensors, 2021
The network security situation of campus networks on CERNET (China Education and Research Network) has received great concern. However, most network managers have no complete picture of the network security because of its special management and the rapid
Rui Zheng   +4 more
doaj   +1 more source

Randomness Optimization for Gadget Compositions in Higher-Order Masking

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Physical characteristics of electronic devices, leaking secret and sensitive information to an adversary with physical access, pose a long-known threat to cryptographic hardware implementations.
Jakob Feldtkeller   +4 more
doaj   +3 more sources

Using the Pattern-of-Life in Networks to Improve the Effectiveness of Intrusion Detection Systems [PDF]

open access: yes, 2017
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.As the complexity of cyber-attacks keeps increasing, new and more robust detection mechanisms need to be ...
Aparicio-Navarro, Francisco J.   +4 more
core   +3 more sources

Interviewing suspects: examining the association between skills, questioning, evidence disclosure, and interview outcomes [PDF]

open access: yes, 2015
The interviewing of suspects is an important element in the investigation of crime. However, studies concerning actual performance of investigators when undertaking such interviews remain sparse. Nevertheless, in England and Wales, since the introduction
Baldwin J.   +17 more
core   +3 more sources

Home - About - Disclaimer - Privacy