19   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici    
This study proposes the wider use of non-intrusive side-channel power data in cybersecurity for intrusion detection. An in-depth analysis of side-channel IoT power behaviour is performed on two well-known IoT devices?a Raspberry Pi 3 model B and a Dragon... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jintao Rao and Zhe Cui    
The SM4 algorithm is widely used to ensure the security of data transmission. The traditional chosen plaintext power attacks against SM4 usually need to analyze four rounds power traces in turn to recover the secret key. In this paper, we propose a new c... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Sung Min Cho, Sunghyun Jin and HeeSeok Kim    
Unified point addition for computing elliptic curve point addition and doubling is considered to be resistant to simple power analysis. Recently, new side-channel attacks, such as recovery of secret exponent by triangular trace analysis and horizontal co... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Dimitrios Myridakis, Paul Myridakis and Athanasios Kakarountas    
Recently, there has been a sharp increase in the production of smart devices and related networks, and consequently the Internet of Things. One concern for these devices, which is constantly becoming more critical, is their protection against attacks due... ver más
Revista: Computation    Formato: Electrónico

 
en línea
Mohammad Nasim Imtiaz Khan, Shivam Bhasin, Bo Liu, Alex Yuan, Anupam Chattopadhyay and Swaroop Ghosh    
Emerging Non-Volatile Memories (NVMs) such as Magnetic RAM (MRAM), Spin-Transfer Torque RAM (STTRAM), Phase Change Memory (PCM) and Resistive RAM (RRAM) are very promising due to their low (static) power operation, high scalability and high performance. ... ver más
Revista: Journal of Low Power Electronics and Applications    Formato: Electrónico

 
en línea
ByeongGyu Park, Suhri Kim, Seokhie Hong, HeeSeok Kim and Seog Chung Seo    
Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum cryptography (PQC). To date, the algebraic security of certain variants of McEliece cryptosystems ha... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Siliang Du, Yi Zha and Qijun Zhao    
The concept of the Fan Wing, a novel aircraft vector-force-integrated device that combines a power unit with a fixed wing to generate distributed lift and thrust by creating a low-pressure vortex on the wing?s surface, was studied. To investigate the uni... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Fahim Sufi    
Algorithms have evolved from machine code to low-code-no-code (LCNC) in the past 20 years. Observing the growth of LCNC-based algorithm development, the CEO of GitHub mentioned that the future of coding is no coding at all. This paper systematically revi... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Nuno Torres, Pedro Pinto and Sérgio Ivan Lopes    
Due to its pervasive nature, the Internet of Things (IoT) is demanding for Low Power Wide Area Networks (LPWAN) since wirelessly connected devices need battery-efficient and long-range communications. Due to its low-cost and high availability (regional/c... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Nikolaus Nova Parulian, Tiffany Lu, Shubhanshu Mishra, Mihai Avram and Jana Diesner    
Observed social networks are often considered as proxies for underlying social networks. The analysis of observed networks oftentimes involves the identification of influential nodes via various centrality measures. This paper brings insights from resear... ver más
Revista: Information    Formato: Electrónico

 
en línea
Marcin Aftowicz, Ievgen Kabin, Zoya Dyka and Peter Langendörfer    
While IoT technology makes industries, cities, and homes smarter, it also opens the door to security risks. With the right equipment and physical access to the devices, the attacker can leverage side-channel information, like timing, power consumption, o... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Fuzhi Wang, Fei Teng, Geyang Xiao, Yuanhao He and Qian Feng    
This paper investigates the resilient distributed secondary control problem against FDI attacks for the seaport microgrid with a high proportion of renewable energy. Firstly, the polymorphic seaport microgrid containing a power layer, a control layer, a ... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Sanjay Nikhade,Suhas Kongre,S. B. Thakre,S. S. Khandare     Pág. 11 - 18
This paper presents a combined experimental and Computational Fluid Dynamics (CFD) simulation of Micro wind Turbine with 2.28 meters rotor Diameter is performed using the FLUENT 16.2 WORKBENCH. A Micro Horizontal Axis Three Blade Wind Turbine was designe... ver más
Revista: IRA-International Journal of Technology & Engineering    Formato: Electrónico

 
en línea
Kyung Choi, Xinyi Chen, Shi Li, Mihui Kim, Kijoon Chae and JungChan Na    
In this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion detection of power systems; NSM is an IEC 62351-7 standard. We analyze a SYN flood attack and a buffer overflow attack to cause the Deni... ver más
Revista: Energies    Formato: Electrónico

 
en línea
Kexiang Qian, Hongyu Yang, Ruyu Li, Weizhe Chen, Xi Luo and Lihua Yin    
With the rapid growth of IoT devices, the threat of botnets is becoming increasingly worrying. There are more and more intelligent detection solutions for botnets that have been proposed with the development of artificial intelligence. However, due to th... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ammar Yahya Daeef, Ali Al-Naji, Ali K. Nahar and Javaan Chahl    
Malware is the primary attack vector against the modern enterprise. Therefore, it is crucial for businesses to exclude malware from their computer systems. The most responsive solution to this issue would operate in real time at the edge of the IT system... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Victor Dyomin, Yuri Morgalev, Igor Polovtsev, Sergey Morgalev, Tamara Morgaleva, Alexandra Davydova and Oksana Kondratova    
Earlier, we showed that the registration of the behavioral responses of autochthonous mesozooplankton communities in situ is a more dynamic methodological approach in the biological assessment of the environmental well-being of aquatic ecosystems, as wel... ver más
Revista: Water    Formato: Electrónico

 
en línea
Konstantinos V. Kostas and Maria Manousaridou    
In this work, supervised Machine Learning (ML) techniques were employed to solve the forward and inverse problems of airfoil and hydrofoil design. The forward problem pertains to the prediction of a foil?s aerodynamic or hydrodynamic performance given it... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Anita Gehlot, Praveen Kumar Malik, Rajesh Singh, Shaik Vaseem Akram and Turki Alsuwian    
An intelligent ecosystem with real-time wireless technology is now playing a key role in meeting the sustainability requirements set by the United Nations. Dairy cattle are a major source of milk production all over the world. To meet the food demand of ... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »