All Stories

  1. Cancer Prognosis and Diagnosis Methods Based on Ensemble Learning
  2. A tradeoff paradigm shift in cryptographically-secure pseudorandom number generation based on discrete logarithm
  3. IIoT Deep Malware Threat Hunting: From Adversarial Example Detection to Adversarial Scenario Detection
  4. AI Makes Crypto Evolve
  5. From Random Numbers to Random Objects
  6. The Dichotomy of Neural Networks and Cryptography: War and Peace
  7. The Modular Subset-Sum Problem and the size of deletion correcting codes
  8. Chaotic Image Encryption: State-of-the-Art, Ecosystem, and Future Roadmap
  9. The Odyssey of Entropy: Cryptography
  10. Key-Dependent Feedback Configuration Matrix of Primitive σ–LFSR and Resistance to Some Known Plaintext Attacks
  11. SteelEye: An Application-Layer Attack Detection and Attribution Model in Industrial Control Systems using Semi-Deep Learning
  12. Cryptography in Hierarchical Coded Caching: System Model and Cost Analysis
  13. Highly Efficient Computationally Derived Novel Metagenome α-Amylase With Robust Stability Under Extreme Denaturing Conditions
  14. A Review on Security of Smart Farming and Precision Agriculture: Security Aspects, Attacks, Threats and Countermeasures
  15. Lower Bounds on Bandwidth Requirements of Regenerating Code Parameter Scaling in Distributed Storage Systems
  16. Content Delivery Networks
  17. Everlasting security of quantum key distribution with 1K-DWCDM and quadratic hash
  18. Root causing, detecting, and fixing flaky tests: State of the art and future roadmap
  19. MCIC: Automated Identification of Cellulases From Metagenomic Data and Characterization Based on Temperature and pH Dependence
  20. Generalized $M_{m,r}$ -Network: A Case for Fixed Message Dimensions
  21. An Optimal Software Framework for Parallel Computation of CRC
  22. An approach to exploiting proper multiples of the generator polynomial in parallel CRC computation
  23. Parallel Computation of CRC Using Special Generator Polynomials
  24. SCOPES: steganography with compression using permutation search
  25. A New Case for Image Compression Using Logic Function Minimization
  26. Systematic Selection of CRC Generator Polynomials to Detect Double Bit Errors in Ethernet Networks
  27. SPIDERS: Swift prime implicant derivation through exhaustive rotation and sort
  28. YALMIC: Yet Another Logic Minimization Based Image Compressor
  29. QTOP: A topological approach to minimizing single-output logic functions
  30. Improved modeling and compensating High Power Amplifier with memory effect
  31. YAARC: yet another approach to further reducing the rate of conflict misses
  32. Modeling and evaluating the time overhead induced by BER in COMA multiprocessors
  33. An approach to exploiting skewed associative memories in avionics systems
  34. A dynamic scheduling algorithm with minimum context switches for spacecraft avionics systems
  35. Minimizing the overhead of dynamic scheduling strategies in avionics systems