|
|
|
Xiaotong Cui, Hongxin Zhang, Xing Fang, Yuanzhen Wang, Danzhi Wang, Fan Fan and Lei Shu
The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key information, which leads to security vulnerabilities. In traditional encryption algorithms, th...
ver más
|
|
|
|
|
|
Tala Talaei Khoei and Naima Kaabouch
Machine learning techniques have emerged as a transformative force, revolutionizing various application domains, particularly cybersecurity. The development of optimal machine learning applications requires the integration of multiple processes, such as ...
ver más
|
|
|
|
|
|
Mugdha P. Kshirsagar and Kanchan C. Khare
The present study is an attempt to model the stormwater quality of a stream located in Pune, India. The city is split up into twenty-three basins (named A to W) by the Pune Municipal Corporation. The selected stream lies in the haphazardly expanded peri-...
ver más
|
|
|
|
|
|
Ana Quijano, Jose L. Hernández, Pierre Nouaille, Mikko Virtanen, Beatriz Sánchez-Sarachu, Francesc Pardo-Bosch and Jörg Knieilng
Sustainability is pivotal in the urban transformation strategy in order to reach more resource-efficient, resilient and smarter cities. The goal of being a sustainable city should drive the decisions for city interventions, and measuring city progress is...
ver más
|
|
|
|
|
|
Angelos Alamanos, Phoebe Koundouri, Lydia Papadaki, Tatiana Pliakou and Eleni Toli
The proactive sustainable management of scarce water across vulnerable agricultural areas of South Europe is a timely issue of major importance, especially under the recent challenges affecting complex water systems. The Basin District of Thessaly, Greec...
ver más
|
|
|