|
|
|
Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici
This study proposes the wider use of non-intrusive side-channel power data in cybersecurity for intrusion detection. An in-depth analysis of side-channel IoT power behaviour is performed on two well-known IoT devices?a Raspberry Pi 3 model B and a Dragon...
ver más
|
|
|
|
|
|
|
Jintao Rao and Zhe Cui
The SM4 algorithm is widely used to ensure the security of data transmission. The traditional chosen plaintext power attacks against SM4 usually need to analyze four rounds power traces in turn to recover the secret key. In this paper, we propose a new c...
ver más
|
|
|
|
|
|
|
Sung Min Cho, Sunghyun Jin and HeeSeok Kim
Unified point addition for computing elliptic curve point addition and doubling is considered to be resistant to simple power analysis. Recently, new side-channel attacks, such as recovery of secret exponent by triangular trace analysis and horizontal co...
ver más
|
|
|
|
|
|
|
Dimitrios Myridakis, Paul Myridakis and Athanasios Kakarountas
Recently, there has been a sharp increase in the production of smart devices and related networks, and consequently the Internet of Things. One concern for these devices, which is constantly becoming more critical, is their protection against attacks due...
ver más
|
|
|
|
|
|
|
Mohammad Nasim Imtiaz Khan, Shivam Bhasin, Bo Liu, Alex Yuan, Anupam Chattopadhyay and Swaroop Ghosh
Emerging Non-Volatile Memories (NVMs) such as Magnetic RAM (MRAM), Spin-Transfer Torque RAM (STTRAM), Phase Change Memory (PCM) and Resistive RAM (RRAM) are very promising due to their low (static) power operation, high scalability and high performance. ...
ver más
|
|
|
|
|
|
|
ByeongGyu Park, Suhri Kim, Seokhie Hong, HeeSeok Kim and Seog Chung Seo
Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum cryptography (PQC). To date, the algebraic security of certain variants of McEliece cryptosystems ha...
ver más
|
|
|
|
|
|
|
Siliang Du, Yi Zha and Qijun Zhao
The concept of the Fan Wing, a novel aircraft vector-force-integrated device that combines a power unit with a fixed wing to generate distributed lift and thrust by creating a low-pressure vortex on the wing?s surface, was studied. To investigate the uni...
ver más
|
|
|
|
|
|
|
Fahim Sufi
Algorithms have evolved from machine code to low-code-no-code (LCNC) in the past 20 years. Observing the growth of LCNC-based algorithm development, the CEO of GitHub mentioned that the future of coding is no coding at all. This paper systematically revi...
ver más
|
|
|
|
|
|
|
Nuno Torres, Pedro Pinto and Sérgio Ivan Lopes
Due to its pervasive nature, the Internet of Things (IoT) is demanding for Low Power Wide Area Networks (LPWAN) since wirelessly connected devices need battery-efficient and long-range communications. Due to its low-cost and high availability (regional/c...
ver más
|
|
|
|
|
|
|
Nikolaus Nova Parulian, Tiffany Lu, Shubhanshu Mishra, Mihai Avram and Jana Diesner
Observed social networks are often considered as proxies for underlying social networks. The analysis of observed networks oftentimes involves the identification of influential nodes via various centrality measures. This paper brings insights from resear...
ver más
|
|
|
|
|
|
|
Marcin Aftowicz, Ievgen Kabin, Zoya Dyka and Peter Langendörfer
While IoT technology makes industries, cities, and homes smarter, it also opens the door to security risks. With the right equipment and physical access to the devices, the attacker can leverage side-channel information, like timing, power consumption, o...
ver más
|
|
|
|
|
|
|
Fuzhi Wang, Fei Teng, Geyang Xiao, Yuanhao He and Qian Feng
This paper investigates the resilient distributed secondary control problem against FDI attacks for the seaport microgrid with a high proportion of renewable energy. Firstly, the polymorphic seaport microgrid containing a power layer, a control layer, a ...
ver más
|
|
|
|
|
|
|
Sanjay Nikhade,Suhas Kongre,S. B. Thakre,S. S. Khandare
Pág. 11 - 18
This paper presents a combined experimental and Computational Fluid Dynamics (CFD) simulation of Micro wind Turbine with 2.28 meters rotor Diameter is performed using the FLUENT 16.2 WORKBENCH. A Micro Horizontal Axis Three Blade Wind Turbine was designe...
ver más
|
|
|
|
|
|
|
Kyung Choi, Xinyi Chen, Shi Li, Mihui Kim, Kijoon Chae and JungChan Na
In this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion detection of power systems; NSM is an IEC 62351-7 standard. We analyze a SYN flood attack and a buffer overflow attack to cause the Deni...
ver más
|
|
|
|
|
|
|
Kexiang Qian, Hongyu Yang, Ruyu Li, Weizhe Chen, Xi Luo and Lihua Yin
With the rapid growth of IoT devices, the threat of botnets is becoming increasingly worrying. There are more and more intelligent detection solutions for botnets that have been proposed with the development of artificial intelligence. However, due to th...
ver más
|
|
|
|
|
|
|
Ammar Yahya Daeef, Ali Al-Naji, Ali K. Nahar and Javaan Chahl
Malware is the primary attack vector against the modern enterprise. Therefore, it is crucial for businesses to exclude malware from their computer systems. The most responsive solution to this issue would operate in real time at the edge of the IT system...
ver más
|
|
|
|
|
|
|
Victor Dyomin, Yuri Morgalev, Igor Polovtsev, Sergey Morgalev, Tamara Morgaleva, Alexandra Davydova and Oksana Kondratova
Earlier, we showed that the registration of the behavioral responses of autochthonous mesozooplankton communities in situ is a more dynamic methodological approach in the biological assessment of the environmental well-being of aquatic ecosystems, as wel...
ver más
|
|
|
|
|
|
|
Konstantinos V. Kostas and Maria Manousaridou
In this work, supervised Machine Learning (ML) techniques were employed to solve the forward and inverse problems of airfoil and hydrofoil design. The forward problem pertains to the prediction of a foil?s aerodynamic or hydrodynamic performance given it...
ver más
|
|
|
|
|
|
|
Anita Gehlot, Praveen Kumar Malik, Rajesh Singh, Shaik Vaseem Akram and Turki Alsuwian
An intelligent ecosystem with real-time wireless technology is now playing a key role in meeting the sustainability requirements set by the United Nations. Dairy cattle are a major source of milk production all over the world. To meet the food demand of ...
ver más
|
|
|
|