Results 91 to 100 of about 32,756 (234)
Surveys, Astrometric Follow-up & Population Statistics
Asteroid surveys are the backbone of asteroid science, and with this in mind we begin with a broad review of the impact of asteroid surveys on our field.
Granvik, Mikael +5 more
core +1 more source
Brain viral reservoirs were undetectable in neonatal SIV during the first 3 days post infection; antiretroviral therapy (ART) at 3 dpi prevented brain reservoir seeding and normalized metabolic function, highlighting the necessity of very early treatment to protect the developing CNS.
Li Ma +12 more
wiley +1 more source
Remote Access Trojan Traffic Detection Based on Fusion Sequences [PDF]
In response to the issues of weak generalization ability,limited representation capability,and delayed warning in exis-ting remote access Trojan(RAT) traffic detection methods,a RAT traffic detection model based on a fusion sequence is proposed.By deeply
WU Fengyuan, LIU Ming, YIN Xiaokang, CAI Ruijie, LIU Shengli
doaj +1 more source
A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection. [PDF]
Dong C +6 more
europepmc +1 more source
Civilly Disobeying What? On Directness and Relevance in Civil Disobedience
Abstract Recent acts of civil disobedience in protest against politicians' inaction about climate change have often targeted works of art to provoke public opinion on the issue. Such initiatives have attracted criticism from those who object to this form of political dissent.
Federico Zuolo
wiley +1 more source
TrojanWhisper: Evaluating Pre-Trained LLMs to Detect and Localize Hardware Trojans
Existing Hardware Trojan (HT) detection methods face critical limitations: logic testing struggles with scalability, side-channel analysis requires golden reference chips, and formal verification suffers from state-space explosion.
Md Omar Faruque +3 more
doaj +1 more source
Intelligent Electromagnetic Sensors for Non-Invasive Trojan Detection. [PDF]
Chen E, Kan J, Yang BY, Zhu J, Chen V.
europepmc +1 more source
Analysis and Improvements in Trojan Designing [PDF]
While there are numerous Trojans out there in the internet, all of them are easily detected by antiviruses or blocked by firewalls. Apart from that, they are also easily detected and removed by any user with a good knowledge in Operating System and ...
Swain, Shanti Swaroop
core
Aristocratic identification in Felix’s Life of Guthlac
Recent scholarship often sees high‐born monastics and clerics in early Christian England as part of the aristocratic class. Modern identity theories, however, suggest that social identity could be dynamic, situational, processual and discursive. In light of this concept, the present article reads Felix’s Life of Guthlac as a text that constructs an ...
Lek Hang Chan
wiley +1 more source
Detection of Botnet in the loT Network [PDF]
The ubiquity of Internet of Things (IoT) devices has prompted security concerns, particularly in the face of evolving botnet attacks. This paper investigates the impact of botnet attacks on IoT devices and proposes a network-based detection and ...
Mumtaz Syeda Lamiya +5 more
doaj +1 more source

