All Stories

  1. From Bottom of Sea to Space: Quo Vadis IoT? So What About Security?
  2. Secure UAV (Drone) and the Great Promise of AI
  3. Cancer Prognosis and Diagnosis Methods Based on Ensemble Learning
  4. A tradeoff paradigm shift in cryptographically-secure pseudorandom number generation based on discrete logarithm
  5. IIoT Deep Malware Threat Hunting: From Adversarial Example Detection to Adversarial Scenario Detection
  6. AI Makes Crypto Evolve
  7. From Random Numbers to Random Objects
  8. The Dichotomy of Neural Networks and Cryptography: War and Peace
  9. The Modular Subset-Sum Problem and the size of deletion correcting codes
  10. Chaotic Image Encryption: State-of-the-Art, Ecosystem, and Future Roadmap
  11. The Odyssey of Entropy: Cryptography
  12. Key-Dependent Feedback Configuration Matrix of Primitive σ–LFSR and Resistance to Some Known Plaintext Attacks
  13. SteelEye: An Application-Layer Attack Detection and Attribution Model in Industrial Control Systems using Semi-Deep Learning
  14. Cryptography in Hierarchical Coded Caching: System Model and Cost Analysis
  15. Highly Efficient Computationally Derived Novel Metagenome α-Amylase With Robust Stability Under Extreme Denaturing Conditions
  16. A Review on Security of Smart Farming and Precision Agriculture: Security Aspects, Attacks, Threats and Countermeasures
  17. Lower Bounds on Bandwidth Requirements of Regenerating Code Parameter Scaling in Distributed Storage Systems
  18. Content Delivery Networks
  19. Everlasting security of quantum key distribution with 1K-DWCDM and quadratic hash
  20. Root causing, detecting, and fixing flaky tests: State of the art and future roadmap
  21. MCIC: Automated Identification of Cellulases From Metagenomic Data and Characterization Based on Temperature and pH Dependence
  22. Generalized $M_{m,r}$ -Network: A Case for Fixed Message Dimensions
  23. S-Restricted Compositions Revisited
  24. An Optimal Software Framework for Parallel Computation of CRC
  25. An approach to exploiting proper multiples of the generator polynomial in parallel CRC computation
  26. Parallel Computation of CRC Using Special Generator Polynomials
  27. SCOPES: steganography with compression using permutation search
  28. A New Case for Image Compression Using Logic Function Minimization
  29. Systematic Selection of CRC Generator Polynomials to Detect Double Bit Errors in Ethernet Networks
  30. SPIDERS: Swift prime implicant derivation through exhaustive rotation and sort
  31. YALMIC: Yet Another Logic Minimization Based Image Compressor
  32. QTOP: A topological approach to minimizing single-output logic functions
  33. Improved modeling and compensating High Power Amplifier with memory effect
  34. YAARC: yet another approach to further reducing the rate of conflict misses
  35. Modeling and evaluating the time overhead induced by BER in COMA multiprocessors
  36. An approach to exploiting skewed associative memories in avionics systems
  37. A dynamic scheduling algorithm with minimum context switches for spacecraft avionics systems
  38. Minimizing the overhead of dynamic scheduling strategies in avionics systems