|
|
|
Fei Gao, Gary Feng, Ying Ouyang, Johnie Jenkins and Changming Liu
Groundwater storage and level have declined rapidly in the Big Sunflower River Watershed (BSRW) of Mississippi Delta in recent years. Farmers in this region are beginning to save groundwater resources by increasing surface water usage for agricultural ir...
ver más
|
|
|
|
|
|
|
Li Pan, Guoying Wu, Mingwu Zhang, Yuan Zhang, Zhongmei Wang and Zhiqiang Lai
The functionality of rivers and open diversion channels can be severely impacted when the epipelic algae group that grows on concrete inclined side walls, which are typical of urban rivers, joins the water flow. This study aims to increase the long-dista...
ver más
|
|
|
|
|
|
|
Marcin Aftowicz, Ievgen Kabin, Zoya Dyka and Peter Langendörfer
While IoT technology makes industries, cities, and homes smarter, it also opens the door to security risks. With the right equipment and physical access to the devices, the attacker can leverage side-channel information, like timing, power consumption, o...
ver más
|
|
|
|
|
|
|
Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici
The growth of the Internet of Things (IoT) has led to a significant rise in cyber attacks and an expanded attack surface for the average consumer. In order to protect consumers and infrastructure, research into detecting malicious IoT activity must be of...
ver más
|
|
|
|
|
|
|
Jérôme Thiébot, Mouncef Sedrati and Sylvain Guillou
The tidal currents of the Gulf of Morbihan reach up to 3.5 m/s within a narrow (200 m large) channel connecting the sea to the inner part of the gulf. In this study, a Telemac2D model validated with a large dataset of field measurements is used to assess...
ver más
|
|
|
|
|
|
|
Valentin Martinoli, Elouan Tourneur, Yannick Teglia and Régis Leveugle
In this work, we study an end-to-end implementation of a Prime + Probe covert channel on the CVA6 RISC-V processor implemented on a FPGA target and running a Linux OS. We develop the building blocks of the covert channel and provide a detailed view of it...
ver más
|
|
|
|
|
|
|
Guilherme Perin, Lichao Wu and Stjepan Picek
The adoption of deep neural networks for profiling side-channel attacks opened new perspectives for leakage detection. Recent publications showed that cryptographic implementations featuring different countermeasures could be broken without feature selec...
ver más
|
|
|
|
|
|
|
Xiaotong Cui, Hongxin Zhang, Xing Fang, Yuanzhen Wang, Danzhi Wang, Fan Fan and Lei Shu
The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key information, which leads to security vulnerabilities. In traditional encryption algorithms, th...
ver más
|
|
|
|
|
|
|
Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici
This study proposes the wider use of non-intrusive side-channel power data in cybersecurity for intrusion detection. An in-depth analysis of side-channel IoT power behaviour is performed on two well-known IoT devices?a Raspberry Pi 3 model B and a Dragon...
ver más
|
|
|
|
|
|
|
Tianwei Huang, Mengxing He, Kan Hong, Yingtien Lin and Pengcheng Jiao
Curved channels and aquatic vegetation are commonly present in the riverine environment. In this study, the effects of vegetation density and distribution on the hydrodynamic characteristics of a mixed layer developed over a 180-degree curved channel wer...
ver más
|
|
|
|