Results 41 to 50 of about 32,756 (234)
An optimal Mars Trojan asteroid search strategy [PDF]
Trojan asteroids are minor planets that share the orbit of a planet about the Sun and librate around the L4 or L5 Lagrangian points of stability. Although only three Mars Trojans have been discovered, models suggest that at least ten times this number ...
Coward, D. M. +3 more
core +5 more sources
A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things
With the development of the Internet of Things, smart devices are widely used. Hardware security is one key issue in the security of the Internet of Things.
Chen Dong +3 more
doaj +1 more source
Hardware Trojan Detection through Information Flow Security Verification
Semiconductor design houses are increasingly becoming dependent on third party vendors to procure intellectual property (IP) and meet time-to-market constraints.
Contreras, Gustavo +5 more
core +1 more source
Research and realization of the Trojan detection engine based on Android
During recent years, Trojan viruses on Android systems have greatly evolved, and the frequent security breach of Android systems is rapidly becoming a great concern of contemporary cyber security. The study of Trojan virus detection on Android engine and
Bin XIA, Feng QIU
doaj +2 more sources
The Absolute Magnitude Distribution of Kuiper Belt Objects [PDF]
Here we measure the absolute magnitude distributions (H-distribution) of the dynamically excited and quiescent (hot and cold) Kuiper Belt objects (KBOs), and test if they share the same H-distribution as the Jupiter Trojans.
Batygin, Konstantin +4 more
core +3 more sources
Smart Hardware Trojan Detection System
The IoT has become an indispensable part of human lives at work and home applications. Due to the need for an enormous number of IoT devices manufacturers are least concerned about security vulnerabilities during designing and developing of these devices.
Iyad Alkhazendar +2 more
openaire +2 more sources
The role of the host—Neutrophil biology
Abstract Neutrophilic polymorphonuclear leukocytes (neutrophils) are myeloid cells packed with lysosomal granules (hence also called granulocytes) that contain a formidable antimicrobial arsenal. They are terminally differentiated cells that play a critical role in acute and chronic inflammation, as well as in the resolution of inflammation and wound ...
Iain L. C. Chapple +4 more
wiley +1 more source
Gate-Level Hardware Trojan Detection Method for Graph Neural Networks Based on Controllability Metrics [PDF]
With the continuous increase in globalization, third-party Intellectual Property (IP) core applications have become increasingly widespread. The gradual maturity of hardware Trojan attack technology enables the implantation of hardware Trojan in the chip
Yang ZHANG, Chang LIU, Shaoqing LI
doaj +1 more source
Trojan Detection in Large Language Models: Insights from The Trojan Detection Challenge
Large Language Models (LLMs) have demonstrated remarkable capabilities in various domains, but their vulnerability to trojan or backdoor attacks poses significant security risks. This paper explores the challenges and insights gained from the Trojan Detection Competition 2023 (TDC2023), which focused on identifying and evaluating trojan attacks on LLMs.
Narek Maloyan +3 more
openaire +2 more sources
Periodontitis and atherosclerotic cardiovascular disease: A critical appraisal
Abstract In spite of intensive research efforts driving spectacular advances in terms of prevention and treatments, cardiovascular diseases (CVDs) remain a leading health burden, accounting for 32% of all deaths (World Health Organization. “Cardiovascular Diseases (CVDs).” WHO, February 1, 2017, https://www.who.int/news‐room/fact‐sheets/detail ...
Maria Clotilde Carra +3 more
wiley +1 more source

