Results 91 to 100 of about 32,756 (234)

Surveys, Astrometric Follow-up & Population Statistics

open access: yes, 2015
Asteroid surveys are the backbone of asteroid science, and with this in mind we begin with a broad review of the impact of asteroid surveys on our field.
Granvik, Mikael   +5 more
core   +1 more source

Brain viral reservoir seeding and neurological metabolic dysregulation in early‐life immunodeficiency virus infection

open access: yesBrain Pathology, EarlyView.
Brain viral reservoirs were undetectable in neonatal SIV during the first 3 days post infection; antiretroviral therapy (ART) at 3 dpi prevented brain reservoir seeding and normalized metabolic function, highlighting the necessity of very early treatment to protect the developing CNS.
Li Ma   +12 more
wiley   +1 more source

Remote Access Trojan Traffic Detection Based on Fusion Sequences [PDF]

open access: yesJisuanji kexue
In response to the issues of weak generalization ability,limited representation capability,and delayed warning in exis-ting remote access Trojan(RAT) traffic detection methods,a RAT traffic detection model based on a fusion sequence is proposed.By deeply
WU Fengyuan, LIU Ming, YIN Xiaokang, CAI Ruijie, LIU Shengli
doaj   +1 more source

A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection. [PDF]

open access: yesSensors (Basel), 2023
Dong C   +6 more
europepmc   +1 more source

Civilly Disobeying What? On Directness and Relevance in Civil Disobedience

open access: yesEuropean Journal of Philosophy, EarlyView.
Abstract Recent acts of civil disobedience in protest against politicians' inaction about climate change have often targeted works of art to provoke public opinion on the issue. Such initiatives have attracted criticism from those who object to this form of political dissent.
Federico Zuolo
wiley   +1 more source

TrojanWhisper: Evaluating Pre-Trained LLMs to Detect and Localize Hardware Trojans

open access: yesIEEE Access
Existing Hardware Trojan (HT) detection methods face critical limitations: logic testing struggles with scalability, side-channel analysis requires golden reference chips, and formal verification suffers from state-space explosion.
Md Omar Faruque   +3 more
doaj   +1 more source

Analysis and Improvements in Trojan Designing [PDF]

open access: yes, 2012
While there are numerous Trojans out there in the internet, all of them are easily detected by antiviruses or blocked by firewalls. Apart from that, they are also easily detected and removed by any user with a good knowledge in Operating System and ...
Swain, Shanti Swaroop
core  

Aristocratic identification in Felix’s Life of Guthlac

open access: yesEarly Medieval Europe, EarlyView.
Recent scholarship often sees high‐born monastics and clerics in early Christian England as part of the aristocratic class. Modern identity theories, however, suggest that social identity could be dynamic, situational, processual and discursive. In light of this concept, the present article reads Felix’s Life of Guthlac as a text that constructs an ...
Lek Hang Chan
wiley   +1 more source

Detection of Botnet in the loT Network [PDF]

open access: yesITM Web of Conferences
The ubiquity of Internet of Things (IoT) devices has prompted security concerns, particularly in the face of evolving botnet attacks. This paper investigates the impact of botnet attacks on IoT devices and proposes a network-based detection and ...
Mumtaz Syeda Lamiya   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy