Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Amogh Kashyap"'
Autor:
Koley, Ipsita, Ghosh, Saurav Kumar, Dey, Soumyajit, Mukhopadhyay, Debdeep, N, Amogh Kashyap K, Singh, Sachin Kumar, Lokesh, Lavanya, Purakkal, Jithin Nalu, Sinha, Nishant
We consider the problem of securing a given control loop implementation of a cyber-physical system (CPS) in the presence of Man-in-the-Middle attacks on data exchange between plant and controller over a compromised network. To this end, there exist v
Externí odkaz:
http://arxiv.org/abs/2002.12412
Autor:
Amanda J. Stock, Saipriya Ayyar, Amogh Kashyap, Yunong Wang, Hagai Yanai, Matthew F. Starost, Mayuri Tanaka-Yano, Monica Bodogai, Chongkui Sun, Yajun Wang, Yi Gong, Chandrakala Puligilla, Evandro F. Fang, Vilhelm A. Bohr, Yie Liu, Isabel Beerman
Publikováno v:
GeroScience.
Short telomeres are a defining feature of telomere biology disorders (TBDs), including dyskeratosis congenita (DC), for which there is no effective general cure. Patients with TBDs often experience bone marrow failure. NAD, an essential metabolic coe
Autor:
Dimitrios Tsitsipatis, Jennifer L. Martindale, Ceereena Ubaida‐Mohien, Alexey Lyashkov, Hagai Yanai, Amogh Kashyap, Chang Hoon Shin, Allison B. Herman, Eunbyul Ji, Jen‐Hao Yang, Rachel Munk, Christopher Dunn, Yevgeniya Lukyanenko, Xiaoling Yang, Chee W. Chia, Ajoy C. Karikkineth, Linda Zukley, Jarod D’Agostino, Mary Kaileh, Chang‐Yi Cui, Isabel Beerman, Luigi Ferrucci, Myriam Gorospe
Publikováno v:
Aging Cell. 21
Changes in the proteome of different human tissues with advancing age are poorly characterized. Here, we studied the proteins present in primary skin fibroblasts collected from 82 healthy individuals across a wide age spectrum (22-89 years old) who p
Autor:
Debdeep Mukhopadhyay, Lavanya Lokesh, Nishant Sinha, Amogh Kashyap K N, Sachin Kumar Singh, Soumyajit Dey, Ipsita Koley, Saurav Kumar Ghosh, Jithin Nalu Purakkal
Publikováno v:
DATE
We consider the problem of securing a given control loop implementation of a cyber-physical system (CPS) in the presence of Man-in-the-Middle attacks on data exchange between plant and controller over a compromised network. To this end, there exist v
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e42f8f0a3e218a8bdf4019d143463c3c
http://arxiv.org/abs/2002.12412
http://arxiv.org/abs/2002.12412