Zobrazeno 1 - 10
of 3 074
pro vyhledávání: '"Meidan, A."'
A key challenge associated with Kubernetes configuration files (KCFs) is that they are often highly complex and error-prone, leading to security vulnerabilities and operational setbacks. Rule-based (RB) tools for KCF misconfiguration detection rely o
Externí odkaz:
http://arxiv.org/abs/2405.19954
We study the evolution of a quantum many-body system driven by two competing measurements, which induces a topological entanglement transition between two distinct area law phases. We employ a positive operator-valued measurement with variable coupli
Externí odkaz:
http://arxiv.org/abs/2404.07918
We study the effect of a Rashba spin-orbit coupling on the nodal superconducting phase of an Ising superconductor. Such nodal phase was predicted to occur when applying an in-plane field beyond the Pauli limit to a superconducting monolayer transitio
Externí odkaz:
http://arxiv.org/abs/2401.05685
Monitored quantum systems undergo Measurement-induced Phase Transitions (MiPTs) stemming from the interplay between measurements and unitary dynamics. When the detector readout is post-selected to match a given value, the dynamics is generated by a N
Externí odkaz:
http://arxiv.org/abs/2312.14022
Autor:
Ling, Henry, Richard, Philip, Koshkaki, Saeed Rahmanian, Kolodrubetz, Michael, Meidan, Dganit, Mitra, Aditi, Pereg-Barnea, T.
Publikováno v:
Phys. Rev. B 109, 155144 (2024)
We study a periodically driven one dimensional Kitaev model in the presence of disorder. In the clean limit our model exhibits four topological phases corresponding to the existence or non-existence of edge modes at zero and pi quasienergy. When diso
Externí odkaz:
http://arxiv.org/abs/2310.17088
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-3 (2024)
Externí odkaz:
https://doaj.org/article/a515e164bbbc46b79ed76c6cae30c2be
Publikováno v:
Computers & Security, 126, 103073 (2023)
IoT devices are known to be vulnerable to various cyber-attacks, such as data exfiltration and the execution of flooding attacks as part of a DDoS attack. When it comes to detecting such attacks using network traffic analysis, it has been shown that
Externí odkaz:
http://arxiv.org/abs/2303.01041
Although home IoT (Internet of Things) devices are typically plain and task oriented, the context of their daily use may affect their traffic patterns. For this reason, anomaly-based intrusion detection systems tend to suffer from a high false positi
Externí odkaz:
http://arxiv.org/abs/2303.01021
Publikováno v:
Frontiers in Oncology, Vol 14 (2024)
Externí odkaz:
https://doaj.org/article/a0b77ee535df4f91b4ab70e98ae69bf2
Publikováno v:
Frontiers in Psychology, Vol 15 (2024)
IntroductionThis study aimed to explore the relationship between family function and altruistic behavior in adolescents, while also investigating the potential mediating roles of extraverted personality and perceived social support.MethodsSurveys wer
Externí odkaz:
https://doaj.org/article/7b991589376142ae8af647efd9a4251a