Detection of Trojan horse by Analysis of System Behavior and Data Packets [PDF]
Trojan horse is said to be one of the most serious threats to computer security. A Trojan horse is an executable file in the Windows operating system. These executable files will have certain static and runtime characteristics.
Abuzneid, Abdelshakour A. +4 more
core
Neuronal differentiation and tissue engineering strategies for central neurous system injury repair
This review outlines tissue engineering advances for central nervous system (CNS) injury treatment, focusing on three core components: seed cells, inductive factors, and scaffold materials, with evaluation of their respective strengths and limitations. Tissue engineering for CNS injury repair.
Zhuqing Xia +9 more
wiley +1 more source
Nanomaterial‐based immune therapeutic strategies in neurodegenerative diseases
This review highlights the immunomodulatory potential of nanomaterials (NMs) in treating neurodegenerative diseases (NDs). It focuses on their roles in regulating innate and adaptive immune responses to maintain immune homeostasis. By providing insights into these mechanisms, the review lays the groundwork for innovative NMs therapeutic strategies to ...
Xinru Zhou +6 more
wiley +1 more source
Reusing Logic Masking to Facilitate Hardware Trojan Detection [PDF]
Hardware Trojan (HT) and Integrated Circuit (IC)/ Intellectual Property (IP) piracy are important threats which may happen in untrusted fabrication foundries.
Beroulle, Vincent +2 more
core
Analisa Pendeteksian Worm Dan Trojan Pada Jaringan Internet Universitas Semarang Menggunakan Metode Kalsifikasi Pada Data Mining C45 Dan Bayesian Network [PDF]
Worm attacks become a dangerous threat and cause damage in the Internet network. If the Internet network worms and trojan attacks the very disruption of traffic data as well as create bandwidth capacity has increased and wasted making the Internet ...
Prathivi, R. (Rastri), Vydia, V. (Vensy)
core +3 more sources
An advanced macrophage‐mediated biomimetic liposome (AC‐LP@RAW) that can penetrate the BBB and precisely target inflammatory sites in the deep brain was established in this study based on the unique immune homing property of macrophages, and showed a significantly improved delivery of curcumin to the brain.
Mengru Wu +5 more
wiley +1 more source
Trojans in Early Design Steps—An Emerging Threat [PDF]
Hardware Trojans inserted by malicious foundries during integrated circuit manufacturing have received substantial attention in recent years. In this paper, we focus on a different type of hardware Trojan threats: attacks in the early steps of design
Becker, Georg T. +2 more
core
Harnessing ferroptosis from multilayer defense networks to nanoplatforms for specific cancer therapy
Nanomaterials target metabolically‐regulated ferroptosis for cancer therapy. Iron‐based or alternative nanoplatforms integrate ferroptosis with chemotherapy, immunotherapy, or radiotherapy. They enable stimulus‐responsive therapies (photothermal, photodynamic, sonodynamic) activated by near‐infrared, light, or ultrasound, achieving potent synergistic ...
Xinyue Xu +5 more
wiley +1 more source
Using Transit Timing Observations to Search for Trojans of Transiting Extrasolar Planets
Theoretical studies predict that Trojans are likely a frequent byproduct of planet formation and evolution. We examine the sensitivity of transit timing observations for detecting Trojan companions to transiting extrasolar planets.
Eric B. Ford +2 more
core +1 more source
A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time [PDF]
Fabless semiconductor industry and government agencies have raised serious concerns about tampering with inserting hardware Trojans in an integrated circuit supply chain in recent years. Most of the recently proposed Trojan detection methods are based on Trojan activation to observe either a faulty output or measurable abnormality on side-channel ...
Hassan Salmani +2 more
openaire +1 more source

