Zobrazeno 1 - 10
of 2 578
pro vyhledávání: '"A Reising"'
Modern cryptography, such as Rivest Shamir Adleman (RSA) and Secure Hash Algorithm (SHA), has been designed by humans based on our understanding of cryptographic methods. Neural Network (NN) based cryptography is being investigated due to its ability
Externí odkaz:
http://arxiv.org/abs/2411.10287
Quantum sources with strong correlations are essential but delicate resources in quantum information science and engineering. Decoherence and loss are the primary factors that degrade nonclassical quantum correlations, with scattering playing a role
Externí odkaz:
http://arxiv.org/abs/2410.02818
Autor:
Joshua H. Tyler, Mohamed K. M. Fadul, Matthew R. Hilling, Donald R. Reising, T. Daniel Loveless
Publikováno v:
Discover Internet of Things, Vol 4, Iss 1, Pp 1-21 (2024)
Abstract Specific Emitter Identification (SEI) has been put forward as an Internet of Things (IoT) Physical Layer Security (PLS) approach for its abilities to detect, characterize, and identify wireless emitters by exploiting distinct, inherent, and
Externí odkaz:
https://doaj.org/article/28d2c04a771a482d99aa466d2276fd63
As power quality becomes a higher priority in the electric utility industry, the amount of disturbance event data continues to grow. Utilities do not have the required personnel to analyze each event by hand. This work presents an automated approach
Externí odkaz:
http://arxiv.org/abs/2309.04361
Autor:
Tyler, Joshua H., Fadul, Mohamed K. M., Hilling, Matthew R., Reising, Donald R., Loveless, T. Daniel
Specific Emitter Identification (SEI) detects, characterizes, and identifies emitters by exploiting distinct, inherent, and unintentional features in their transmitted signals. Since its introduction, a significant amount of work has been conducted;
Externí odkaz:
http://arxiv.org/abs/2308.03579
Increasing Internet of Things (IoT) deployments present a growing surface over which villainous actors can carry out attacks. This disturbing revelation is amplified by the fact that a majority of IoT devices use weak or no encryption at all. Specifi
Externí odkaz:
http://arxiv.org/abs/2305.03853
Autor:
Fadul, Mohamed k., Reising, Donald R., Weerasena, Lakmali P., Loveless, T. Daniel, Sartipi, Mina
The number of Internet of Things (IoT) deployments is expected to reach 75.4 billion by 2025. Roughly 70% of all IoT devices employ weak or no encryption; thus, putting them and their connected infrastructure at risk of attack by devices that are wro
Externí odkaz:
http://arxiv.org/abs/2304.00648
Autor:
Miglior, F., author, Pinotti, L., author, Boyle, L., author, Kenny, D., author, Lee, M., author, De Marchi, M., author, Cadavez, V.A.P., author, Millet, S., author, Evans, R., author, Veldkamp, T., author, Pastell, M., author, Pollott, G., author, Spoolder, H., author, Baumung, R., author, Boettcher, P., author, Reising, C.A., author, Okore, C., author, Leroy, G., author
Publikováno v:
Book of Abstracts of the 73rd Annual Meeting of the European Federation of Animal Science. :496-496
Autor:
Reising, Matthew K. (AUTHOR)
Publikováno v:
Journal of Ecumenical Studies. Spring2024, Vol. 59 Issue 2, p242-262. 21p.
Publikováno v:
IEEE Internet of Things Journal 2021
It is estimated that the number of IoT devices will reach 75 billion in the next five years. Most of those currently, and to be deployed, lack sufficient security to protect themselves and their networks from attack by malicious IoT devices that masq
Externí odkaz:
http://arxiv.org/abs/2005.09503