Results 61 to 70 of about 32,756 (234)

Detection of Trojan horse by Analysis of System Behavior and Data Packets [PDF]

open access: yes, 2015
Trojan horse is said to be one of the most serious threats to computer security. A Trojan horse is an executable file in the Windows operating system. These executable files will have certain static and runtime characteristics.
Abuzneid, Abdelshakour A.   +4 more
core  

Neuronal differentiation and tissue engineering strategies for central neurous system injury repair

open access: yesBMEMat, EarlyView.
This review outlines tissue engineering advances for central nervous system (CNS) injury treatment, focusing on three core components: seed cells, inductive factors, and scaffold materials, with evaluation of their respective strengths and limitations. Tissue engineering for CNS injury repair.
Zhuqing Xia   +9 more
wiley   +1 more source

Nanomaterial‐based immune therapeutic strategies in neurodegenerative diseases

open access: yesBMEMat, EarlyView.
This review highlights the immunomodulatory potential of nanomaterials (NMs) in treating neurodegenerative diseases (NDs). It focuses on their roles in regulating innate and adaptive immune responses to maintain immune homeostasis. By providing insights into these mechanisms, the review lays the groundwork for innovative NMs therapeutic strategies to ...
Xinru Zhou   +6 more
wiley   +1 more source

Reusing Logic Masking to Facilitate Hardware Trojan Detection [PDF]

open access: yes, 2016
Hardware Trojan (HT) and Integrated Circuit (IC)/ Intellectual Property (IP) piracy are important threats which may happen in untrusted fabrication foundries.
Beroulle, Vincent   +2 more
core  

Analisa Pendeteksian Worm Dan Trojan Pada Jaringan Internet Universitas Semarang Menggunakan Metode Kalsifikasi Pada Data Mining C45 Dan Bayesian Network [PDF]

open access: yes, 2017
Worm attacks become a dangerous threat and cause damage in the Internet network. If the Internet network worms and trojan attacks the very disruption of traffic data as well as create bandwidth capacity has increased and wasted making the Internet ...
Prathivi, R. (Rastri), Vydia, V. (Vensy)
core   +3 more sources

A novel biomimetic liposome drug delivery system mediated by macrophage targeting for precision treatment of encephalitis

open access: yesBMEMat, EarlyView.
An advanced macrophage‐mediated biomimetic liposome (AC‐LP@RAW) that can penetrate the BBB and precisely target inflammatory sites in the deep brain was established in this study based on the unique immune homing property of macrophages, and showed a significantly improved delivery of curcumin to the brain.
Mengru Wu   +5 more
wiley   +1 more source

Trojans in Early Design Steps—An Emerging Threat [PDF]

open access: yes, 2016
Hardware Trojans inserted by malicious foundries during integrated circuit manufacturing have received substantial attention in recent years. In this paper, we focus on a different type of hardware Trojan threats: attacks in the early steps of design
Becker, Georg T.   +2 more
core  

Harnessing ferroptosis from multilayer defense networks to nanoplatforms for specific cancer therapy

open access: yesBMEMat, EarlyView.
Nanomaterials target metabolically‐regulated ferroptosis for cancer therapy. Iron‐based or alternative nanoplatforms integrate ferroptosis with chemotherapy, immunotherapy, or radiotherapy. They enable stimulus‐responsive therapies (photothermal, photodynamic, sonodynamic) activated by near‐infrared, light, or ultrasound, achieving potent synergistic ...
Xinyue Xu   +5 more
wiley   +1 more source

Using Transit Timing Observations to Search for Trojans of Transiting Extrasolar Planets

open access: yes, 2007
Theoretical studies predict that Trojans are likely a frequent byproduct of planet formation and evolution. We examine the sensitivity of transit timing observations for detecting Trojan companions to transiting extrasolar planets.
Eric B. Ford   +2 more
core   +1 more source

A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time [PDF]

open access: yesIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2012
Fabless semiconductor industry and government agencies have raised serious concerns about tampering with inserting hardware Trojans in an integrated circuit supply chain in recent years. Most of the recently proposed Trojan detection methods are based on Trojan activation to observe either a faulty output or measurable abnormality on side-channel ...
Hassan Salmani   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy