Results 91 to 100 of about 32,602 (220)

Remote Access Trojan Traffic Detection Based on Fusion Sequences [PDF]

open access: yesJisuanji kexue
In response to the issues of weak generalization ability,limited representation capability,and delayed warning in exis-ting remote access Trojan(RAT) traffic detection methods,a RAT traffic detection model based on a fusion sequence is proposed.By deeply
WU Fengyuan, LIU Ming, YIN Xiaokang, CAI Ruijie, LIU Shengli
doaj   +1 more source

Unequal Solidarity: Club Rules and Crisis Support in the European Polity

open access: yesJCMS: Journal of Common Market Studies, EarlyView.
Abstract Is European solidarity during crises due to common or close identities? Or do Europeans punish rule‐breaking countries by showing them less solidarity? Research on the determinants of European solidarity increasingly focuses on ‘solidarity to’, how givers' attitudes are shaped by their perceptions of receiving member states.
Zbigniew Truchlewski   +2 more
wiley   +1 more source

Dataset for hardware Trojan detection

open access: yes, 2022
Nowadays, cloud services rely extensively on the use of virtual machines to enforce security by isolation. However, hardware trojan attacks break this assumption. Within these attacks, cache side-channel attacks such as Spectre and Meltdown are the focus of this work.
openaire   +1 more source

Phage Therapy: Targeting the Gut Microbiota for the Treatment of Acute Pancreatitis

open access: yesJournal of Gastroenterology and Hepatology, EarlyView.
ABSTRACT Acute pancreatitis (AP) is a common clinical inflammatory condition whose severity is closely associated with both local pancreatic injury and systemic complications. Research indicates that gut microbiota dysbiosis and subsequent bacterial translocation can exacerbate disease progression via the gut–pancreas axis, representing a critical ...
Jiawei Chen   +4 more
wiley   +1 more source

A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection. [PDF]

open access: yesSensors (Basel), 2023
Dong C   +6 more
europepmc   +1 more source

TrojanWhisper: Evaluating Pre-Trained LLMs to Detect and Localize Hardware Trojans

open access: yesIEEE Access
Existing Hardware Trojan (HT) detection methods face critical limitations: logic testing struggles with scalability, side-channel analysis requires golden reference chips, and formal verification suffers from state-space explosion.
Md Omar Faruque   +3 more
doaj   +1 more source

City of God and the Duty of Just Memory

open access: yesModern Theology, EarlyView.
Abstract In a recent essay, Richard Miller claims that Augustine presumes a duty to remember justly in his City of God. However, Miller's brief reference to a presumed duty of “just memory” does not fully explain how Augustine conceptualizes this duty or how it relates to his theological concerns.
Zachary J. Taylor
wiley   +1 more source

Detection of Botnet in the loT Network [PDF]

open access: yesITM Web of Conferences
The ubiquity of Internet of Things (IoT) devices has prompted security concerns, particularly in the face of evolving botnet attacks. This paper investigates the impact of botnet attacks on IoT devices and proposes a network-based detection and ...
Mumtaz Syeda Lamiya   +5 more
doaj   +1 more source

Thermal Scans for Detecting Hardware Trojans [PDF]

open access: yes, 2018
It is well known that companies have been outsourcing their IC production to countries where it is simply not possible to guarantee the integrity of final products. This relocation trend creates a need for methodologies and embedded design solutions to identify counterfeits but also to detect potential Hardware Trojans (HT).
Cozzi, Maxime   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy