Results 91 to 100 of about 32,602 (220)
Remote Access Trojan Traffic Detection Based on Fusion Sequences [PDF]
In response to the issues of weak generalization ability,limited representation capability,and delayed warning in exis-ting remote access Trojan(RAT) traffic detection methods,a RAT traffic detection model based on a fusion sequence is proposed.By deeply
WU Fengyuan, LIU Ming, YIN Xiaokang, CAI Ruijie, LIU Shengli
doaj +1 more source
Unequal Solidarity: Club Rules and Crisis Support in the European Polity
Abstract Is European solidarity during crises due to common or close identities? Or do Europeans punish rule‐breaking countries by showing them less solidarity? Research on the determinants of European solidarity increasingly focuses on ‘solidarity to’, how givers' attitudes are shaped by their perceptions of receiving member states.
Zbigniew Truchlewski +2 more
wiley +1 more source
Dataset for hardware Trojan detection
Nowadays, cloud services rely extensively on the use of virtual machines to enforce security by isolation. However, hardware trojan attacks break this assumption. Within these attacks, cache side-channel attacks such as Spectre and Meltdown are the focus of this work.
openaire +1 more source
Phage Therapy: Targeting the Gut Microbiota for the Treatment of Acute Pancreatitis
ABSTRACT Acute pancreatitis (AP) is a common clinical inflammatory condition whose severity is closely associated with both local pancreatic injury and systemic complications. Research indicates that gut microbiota dysbiosis and subsequent bacterial translocation can exacerbate disease progression via the gut–pancreas axis, representing a critical ...
Jiawei Chen +4 more
wiley +1 more source
A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection. [PDF]
Dong C +6 more
europepmc +1 more source
TrojanWhisper: Evaluating Pre-Trained LLMs to Detect and Localize Hardware Trojans
Existing Hardware Trojan (HT) detection methods face critical limitations: logic testing struggles with scalability, side-channel analysis requires golden reference chips, and formal verification suffers from state-space explosion.
Md Omar Faruque +3 more
doaj +1 more source
Intelligent Electromagnetic Sensors for Non-Invasive Trojan Detection. [PDF]
Chen E, Kan J, Yang BY, Zhu J, Chen V.
europepmc +1 more source
City of God and the Duty of Just Memory
Abstract In a recent essay, Richard Miller claims that Augustine presumes a duty to remember justly in his City of God. However, Miller's brief reference to a presumed duty of “just memory” does not fully explain how Augustine conceptualizes this duty or how it relates to his theological concerns.
Zachary J. Taylor
wiley +1 more source
Detection of Botnet in the loT Network [PDF]
The ubiquity of Internet of Things (IoT) devices has prompted security concerns, particularly in the face of evolving botnet attacks. This paper investigates the impact of botnet attacks on IoT devices and proposes a network-based detection and ...
Mumtaz Syeda Lamiya +5 more
doaj +1 more source
Thermal Scans for Detecting Hardware Trojans [PDF]
It is well known that companies have been outsourcing their IC production to countries where it is simply not possible to guarantee the integrity of final products. This relocation trend creates a need for methodologies and embedded design solutions to identify counterfeits but also to detect potential Hardware Trojans (HT).
Cozzi, Maxime +2 more
openaire +2 more sources

