All Stories

  1. Secure UAV (Drone) and the Great Promise of AI
  2. Cancer Prognosis and Diagnosis Methods Based on Ensemble Learning
  3. A tradeoff paradigm shift in cryptographically-secure pseudorandom number generation based on discrete logarithm
  4. IIoT Deep Malware Threat Hunting: From Adversarial Example Detection to Adversarial Scenario Detection
  5. AI Makes Crypto Evolve
  6. From Random Numbers to Random Objects
  7. The Dichotomy of Neural Networks and Cryptography: War and Peace
  8. The Modular Subset-Sum Problem and the size of deletion correcting codes
  9. Chaotic Image Encryption: State-of-the-Art, Ecosystem, and Future Roadmap
  10. The Odyssey of Entropy: Cryptography
  11. Key-Dependent Feedback Configuration Matrix of Primitive σ–LFSR and Resistance to Some Known Plaintext Attacks
  12. SteelEye: An Application-Layer Attack Detection and Attribution Model in Industrial Control Systems using Semi-Deep Learning
  13. Cryptography in Hierarchical Coded Caching: System Model and Cost Analysis
  14. Highly Efficient Computationally Derived Novel Metagenome α-Amylase With Robust Stability Under Extreme Denaturing Conditions
  15. A Review on Security of Smart Farming and Precision Agriculture: Security Aspects, Attacks, Threats and Countermeasures
  16. Lower Bounds on Bandwidth Requirements of Regenerating Code Parameter Scaling in Distributed Storage Systems
  17. Content Delivery Networks
  18. Everlasting security of quantum key distribution with 1K-DWCDM and quadratic hash
  19. Root causing, detecting, and fixing flaky tests: State of the art and future roadmap
  20. MCIC: Automated Identification of Cellulases From Metagenomic Data and Characterization Based on Temperature and pH Dependence
  21. Generalized $M_{m,r}$ -Network: A Case for Fixed Message Dimensions
  22. An Optimal Software Framework for Parallel Computation of CRC
  23. An approach to exploiting proper multiples of the generator polynomial in parallel CRC computation
  24. Parallel Computation of CRC Using Special Generator Polynomials
  25. SCOPES: steganography with compression using permutation search
  26. A New Case for Image Compression Using Logic Function Minimization
  27. Systematic Selection of CRC Generator Polynomials to Detect Double Bit Errors in Ethernet Networks
  28. SPIDERS: Swift prime implicant derivation through exhaustive rotation and sort
  29. YALMIC: Yet Another Logic Minimization Based Image Compressor
  30. QTOP: A topological approach to minimizing single-output logic functions
  31. Improved modeling and compensating High Power Amplifier with memory effect
  32. YAARC: yet another approach to further reducing the rate of conflict misses
  33. Modeling and evaluating the time overhead induced by BER in COMA multiprocessors
  34. An approach to exploiting skewed associative memories in avionics systems
  35. A dynamic scheduling algorithm with minimum context switches for spacecraft avionics systems
  36. Minimizing the overhead of dynamic scheduling strategies in avionics systems