Results 51 to 60 of about 19,739 (264)
A Covert Data Transport Protocol
Both enterprise and national firewalls filter network connections. For data forensics and botnet removal applications, it is important to establish the information source.
Brooks, Richard +4 more
core +1 more source
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll +19 more
wiley +1 more source
OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element
Software obfuscation is a powerful tool to protect the intellectual property or secret keys inside programs. Strong software obfuscation is crucial in the context of untrusted execution environments (e.g., subject to malware infection) or to face ...
Darius Mercadier +3 more
doaj +1 more source
Asymmetry of the Ferroelectric Phase Transition in BaTiO3
Phase transitions are typically assumed to behave identically in forward and reverse. This work shows that in the ferroelectric material barium titanate this is not true: heating drives an abrupt, first‐order jump, while cooling gives a smooth, continuous change.
Asaf Hershkovitz +14 more
wiley +1 more source
A Framework to Quantify the Quality of Source Code Obfuscation
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin +4 more
doaj +1 more source
This review explores recent advances in digital micromirror device (DMD)‐based lithography, focusing on its programmable light modulation, multi‐material compatibility, and dimensional patterning strategies. It highlights innovations from optical system design to materials integration and multifunctional applications, positioning DMD lithography as a ...
Yubin Lee +5 more
wiley +1 more source
In the field of software protection, when there is a dependence between the various software protection technologies, the application order of these technologies must be arranged in a correct way in order to maximize the protection effect.
Qing Su, Fan He, Naiqi Wu, Zhiyi Lin
doaj +1 more source
Soybean Auxin Transporter PIN3 Regulates Nitrate Acquisition to Improve Nitrogen Use and Seed Traits
Xu et al. discovers that switching off auxin transporters in soybean, PIN3a and PIN3b, disrupts auxin flow; this triggers ARF‐STF3/4 signal cascade to activate the nitrate importer NPF2.13 and soil nitrogen acquisition. Multi‐year field trials show edited soybeans maintain yield with higher oil content, offering a potential genetic route to improve ...
Huifang Xu +16 more
wiley +1 more source
Vulnerability Analysis and Detection of Android System Signature [PDF]
Aiming at the problem that an attacker can issue pirated software by re-signing the vulnerabilities in the self-signature process of Android system application program,this paper analyses the digital signature and verification process of Android system ...
LIAO Fangyuan, GAN Zhiwang
doaj +1 more source
Using human induced pluripotent stem cells (hiPSCs)‐derived neuronal model, Tian and colleagues reveal that voltage‐gated calcium channels Cav1.2 and Cav1.3, and their mediated calcium ion influx, are essential for early morphogenesis of human neuronal development, while ECEL1 underlies human neuronal functional developmental maturation through CALM3 ...
Yue Tian +5 more
wiley +1 more source

