Zobrazeno 1 - 10
of 879
pro vyhledávání: '"A, Halak"'
Autor:
Halak, Basel, Csete, Cristian Sebastian, Joyce, Edward, Papaioannou, Jack, Pires, Alexandre, Soma, Jin, Gokkaya, Betul, Murphy, Michael
The rapid advancement of quantum computing poses a significant threat to many current security algorithms used for secure communication, digital authentication, and information encryption. A sufficiently powerful quantum computer could potentially ex
Externí odkaz:
http://arxiv.org/abs/2407.13523
Many cache designs have been proposed to guard against contention-based side-channel attacks. One well-known type of cache is the randomized remapping cache. Many randomized remapping caches provide fixed or over protection, which leads to permanent
Externí odkaz:
http://arxiv.org/abs/2405.20027
This study introduces a refined Flooding Injection Rate-adjustable Denial-of-Service (DoS) model for Network-on-Chips (NoCs) and more importantly presents DL2Fence, a novel framework utilizing Deep Learning (DL) and Frame Fusion (2F) for DoS detectio
Externí odkaz:
http://arxiv.org/abs/2403.13563
The software product is a source of cyber-attacks that target organizations by using their software supply chain as a distribution vector. As the reliance of software projects on open-source or proprietary modules is increasing drastically, SSC is be
Externí odkaz:
http://arxiv.org/abs/2305.14157
Machine learning algorithms are used to construct a mathematical model for a system based on training data. Such a model is capable of making highly accurate predictions without being explicitly programmed to do so. These techniques have a great many
Externí odkaz:
http://arxiv.org/abs/2202.10377
Autor:
Waldeck, Stephan, Becker, Benjamin V., Buz, Semih, Sharma, Paritosh, Matson, Matthew, Hamady, Mohamed, Riga, Celia, Hoksbergen, Arjan, Yeung, Kak Khee, Lovato, Luigi, Buia, Francesco, Marzo, Ana Cristina, Abisi, Said, Zayed, Hany, Frigatti, Paolo, Furlan, Federico, Simonte, Gioele, Isernia, Giacomo, Kuczmik, Wacław, Fattoum, Maher, Halak, Moshe, Silverberg, Daniel, Gkoutzios, Panos, Saha, Prakash
Publikováno v:
In Journal of Vascular Surgery August 2024 80(2):336-343
Autor:
Basel Halak, Thomas Gibson, Millicent Henley, Cristin-Bianca Botea, Benjamin Heath, Sayedur Khan
Publikováno v:
IEEE Access, Vol 12, Pp 8791-8805 (2024)
The accelerated development of quantum computers poses a direct threat to all current standards of public key encryption, for example, the Shor algorithm exploits the superposition state of the qubits to solve the problem of integer factorization in
Externí odkaz:
https://doaj.org/article/a4f7843fb89f4517ae69cd98da48e5cb
Autor:
Yu, Xindi, Zhang, Qicheng, da Silva, Rodrigo J., Panzera, Tulio Halak, Schenk, Mark, Scarpa, Fabrizio
Publikováno v:
In Thin-Walled Structures December 2024 205 Part C
In the last few years, serious games have become popular, with a consensus of the benefits for teaching cyber security awareness and education. However, there is still a lack of pedagogical driven methodologies and tools to support serious games desi
Externí odkaz:
http://arxiv.org/abs/2110.11765
Publikováno v:
In Annals of Vascular Surgery July 2024 104:132-138