An advanced threat actor tracked as UAT-8837 and believed to be linked to China has been focusing on critical infrastructure ...
Abstract: In this study, carbon nanotube field-effect transistors (CNTFETs) are presented as the basis for energy-efficient multiple-valued logic (MVL) circuits. Leveraging CNTFET unique properties ...
Using the Different Maps to Design and Implement a Chaotic Cryptographic Scheme for Image Encryption
Abstract: Image encryption is a crucial aspect of digital data security since many aspects of the weakness found in traditional encryption methods like AES and RSA, especially high computational time ...
A suspected Russia-aligned group has been attributed to a phishing campaign that employs device code authentication workflows to steal victims' Microsoft 365 credentials and conduct account takeover ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results