Results 21 to 30 of about 5,262 (215)
LibAFL QEMU: A Library for Fuzzing-oriented Emulation
Romain Malmain +2 more
openalex +2 more sources
Abstract The quality of such processed agrifood products as dehydrated apple is related to the quality and variety of fresh harvested products and connected with wastage reduction throughout the agrifood supply chain. For this purpose, cold‐storage management is important to avoid or mitigate the quality decay of fresh products stored in refrigerated ...
Jordi Mateo‐Fornés +4 more
wiley +1 more source
Android Malware Detection Based on Program Genes
The security issues with mobile devices have received more attention as a result of the development of mobile Internet technology and the adoption of mobile intelligent terminal devices. It is becoming more crucial to quickly and effectively identify and remove harmful applications from systems in order to protect user data and personal devices.
Qingfeng Li +3 more
wiley +1 more source
Rumba : a Python framework for automating large-scale recursive internet experiments on GENI and FIRE+ [PDF]
It is not easy to design and run Convolutional Neural Networks (CNNs) due to: 1) finding the optimal number of filters (i.e., the width) at each layer is tricky, given an architecture; and 2) the computational intensity of CNNs impedes the deployment on ...
Capitani, M. +3 more
core +4 more sources
NQC²: A Non-Intrusive QEMU Code Coverage Plugin [PDF]
Nils Bosbach +6 more
openalex +2 more sources
TZEAMM: An Efficient and Secure Active Measurement Method Based on TrustZone
With the rapid development of computer and communication technology, embedded systems are widely used in smart devices. The increasing connectivity of these systems and the difficulties in providing comprehensive security have made such devices vulnerable to malicious attacks.
Xiaoqing Liu +4 more
wiley +1 more source
DTN performance analysis of multi‐asset Mars‐Earth communications
This study focused on the applicability of the delay‐tolerant networking (DTN) protocol architecture to a complex network setup, representative of space communications between Mars and Earth ground stations. The work analysed multi‐link connectivity in terms of direct‐to‐Earth links, support of Mars orbiters and European Data Relay Satellite (EDRS ...
Nicola Alessi +4 more
wiley +1 more source
Mega‐analysis methods in ENIGMA: The experience of the generalized anxiety disorder working group
This report summarizes the background information and rationale for the various methodological decisions made by the ENIGMA—GAD group. The aim of this work is to help guide other research groups working with large brain imaging data sets. Abstract The ENIGMA group on Generalized Anxiety Disorder (ENIGMA‐Anxiety/GAD) is part of a broader effort to ...
André Zugman +87 more
wiley +1 more source
The rapid development of contemporary technology has subtly changed people’s way of life, and the quality of people’s life has been greatly improved. With great room for development and bright prospects for development, as the Internet develops, people are paying more and more attention to smart home experiences.
Jinkun Li +3 more
wiley +1 more source
VNGuarder: An Internal Threat Detection Approach for Virtual Network in Cloud Computing Environment
Edge‐assisted Internet of things applications often need to use cloud virtual network services to transmit data. However, the internal threats such as illegal management and configuration to cloud platform intentionally or unintentionally will lead to virtual network security problems such as malicious changes of user network and hijacked data flow. It
Li Lin +4 more
wiley +1 more source

