Zobrazeno 1 - 10
of 38
pro vyhledávání: '"Dima Bykhovsky"'
Autor:
Mikhail Ronkin, Dima Bykhovsky
Publikováno v:
Sensors, Vol 23, Iss 1, p 533 (2023)
One possible device authentication method is based on device fingerprints, such as software- or hardware-based unique characteristics. In this paper, we propose a fingerprinting technique based on passive externally measured information, i.e., curren
Externí odkaz:
https://doaj.org/article/c1f348ca039f4ea897fb34b11d0a4779
Autor:
Dima Bykhovsky
Publikováno v:
Energies, Vol 15, Iss 2, p 653 (2022)
Switched-mode power supplies (SMPSs) are an important component in many electrical systems. As a highly non-linear device, an unavoidable side-effect of SMPS operation is its high harmonics power. One of the ways to model the harmonic power consumpti
Externí odkaz:
https://doaj.org/article/36bd616c7c0b4aea896ecd42f7da0aa7
Autor:
Dima Bykhovsky
Publikováno v:
Sensors, Vol 20, Iss 18, p 5067 (2020)
The coherence time is the time over which the channel-gain-values correlation coefficient drops below a predefined threshold. The coherence time is typically used to quantify the pace of appreciable channel changes and is important, for example, for
Externí odkaz:
https://doaj.org/article/cd155df90a35430b9fded45b6a2a2cc1
Publikováno v:
2022 12th Workshop on Hyperspectral Imaging and Signal Processing: Evolution in Remote Sensing (WHISPERS).
Autor:
Mikhail Ronkin, Dima Bykhovsky
Publikováno v:
2022 45th International Conference on Telecommunications and Signal Processing (TSP).
Autor:
Dima Bykhovsky
Publikováno v:
Computer Applications in Engineering Education. 28:314-323
Autor:
Dima Bykhovsky
Publikováno v:
The International Journal of Electrical Engineering & Education. 59:71-80
Recent breakthroughs lowering the costs of software-defined radio devices have made them very attractive for teaching wireless communication. This paper provides an example of an undergraduate course that incorporates the use of low-cost software-def
Autor:
Dima Bykhovsky, Mordechai Guri
Publikováno v:
Computers & Security. 82:15-29
Breaching highly secure networks with advanced persistent threats (APTs) has been proven feasible in the last decade, however communication between the attacker outside the organization and the APT inside the organization is not possible if the compr
Air-gapped computers are systems that are kept isolated from the Internet since they store or process sensitive information. In this paper, we introduce an optical covert channel in which an attacker can leak (or, exfiltlrate) sensitive information f
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2a5e3cc5c449ba167ad23fec926f9d53
Autor:
Dima Bykhovsky, Vladimir Lyandres
Publikováno v:
Digital Signal Processing. 77:43-47
Stochastic modeling commonly requires random process generation with an exponential autocorrelation function (ACF). These random processes may be represented as a solution of a stochastic differential equation (SDE) of the first order and usually hav