Last 7 days
![]() ; ; Parlier, Hugo ![]() in Math. Ann. (2021), 380(1-2), 825--854 Detailed reference viewed: 18 (0 UL)![]() Belmans, Pieter ![]() in Transformation Groups (2021) Detailed reference viewed: 15 (0 UL)![]() ; Spindola Diniz, Ricardo ![]() Book published by Contracorrente (2021) Detailed reference viewed: 24 (0 UL)![]() Belmans, Pieter ![]() in Notices of the American Mathematical Society (2021), 69(9), 1524--1527 Detailed reference viewed: 20 (0 UL)![]() Harnoncourt, Julia ![]() Book published by Promedia (2021) Detailed reference viewed: 45 (1 UL)![]() ; ; et al in EURASIP Journal on Wireless Communications and Networking (2021) An alternative or supplementary approach named as physical layer security has been recently proposed to afford an extra security layer on top of the conventional cryptography technique. In this paper, an ... [more ▼] An alternative or supplementary approach named as physical layer security has been recently proposed to afford an extra security layer on top of the conventional cryptography technique. In this paper, an overview of secrecy performance investigations over the classic Alice-Bob-Eve wiretap fading channels is conducted. On the basis of the classic wiretap channel model, we have comprehensively listed and thereafter compared the existing works on physical layer secrecy analysis considering the small-scale, large-scale, composite, and cascaded fading channel models. Exact secrecy metrics expressions, including secrecy outage probability (SOP), the probability of non-zero secrecy capacity (PNZ), and average secrecy capacity (ASC), and secrecy bounds, including the lower bound of SOP and ergodic secrecy capacity, are presented. In order to encompass the aforementioned four kinds of fading channel models with a more generic and flexible distribution, the mixture gamma (MG), mixture of Gaussian (MoG), and Fox’s H- function distributions are three useful candidates to largely include the above-mentioned four kinds of fading channel models. It is shown that all they are flexible and general when assisting the secrecy analysis to obtain closed-form expressions. Their advantages and limitations are also highlighted. Conclusively, these three approaches are proven to provide a unified secrecy analysis framework and can cover all types of independent wiretap fading channel models. Apart from those, revisiting the existing secrecy enhancement techniques based on our system configuration, the on-off transmission scheme, artificial noise (AN) & artificial fast fading (AFF), jamming approach, antenna selection, and security region are presented. [less ▲] Detailed reference viewed: 46 (7 UL)![]() Mahfouz, Ahmed ![]() in IAC 2021 congress proceedings, 72nd International Astronautical Congress (IAC) (2021) The collective behavior of four magnetically controlled CubeSats in LEO is considered. The spacecraft flyas a group and when commanded, use intersatellite link to negotiate and determine the most ... [more ▼] The collective behavior of four magnetically controlled CubeSats in LEO is considered. The spacecraft flyas a group and when commanded, use intersatellite link to negotiate and determine the most favorablearrangement to provide maximum sky coverage around a specified reference direction by onboard sensors.The most favorable arrangement is attained through attitude task allocation consensus and arrived at by afully magnetic controller implemented onboard of each spacecraft [less ▲] Detailed reference viewed: 43 (4 UL)![]() Mahfouz, Ahmed ![]() in CDSR 2021 conference proceedings, 8th International Conference on Control, Dynamic Systems, and Robotics (CDSR'21) (2021) The paper delineates the magnetic controller gains tuning procedure for an active magnetic attitude control system of a CubeSat in the ISS orbit. The optimization is conducted for arbitrary required ... [more ▼] The paper delineates the magnetic controller gains tuning procedure for an active magnetic attitude control system of a CubeSat in the ISS orbit. The optimization is conducted for arbitrary required attitude given in the orbital reference frame of the spacecraft. The study has been conducted as a part of the Skoltech University project to deploy a swarm of 3U CubeSats for collective gamma-ray bursts detection, which requires the satellites' coordinated attitude control. We consider four identical CubeSats exhibiting swarm behaviour by optimal attitude task allocation on receipt of a command from the mission control center. The first part of this study shows how to obtain the controller gains via linearization of the spacecraft rotational dynamics in the vicinity of the required attitude regime and subsequent numerical optimization (carried out in terms of Floquet theory). The second part shows the collective attitude control scenario. The task of the swarm is to ensure maximum sky coverage around a principal direction uplinked to the spacecraft. The task extends to ensuring the maximum collective stability of the swarm through implementing the optimization algorithm. [less ▲] Detailed reference viewed: 14 (2 UL)![]() ; ; et al E-print/Working paper (2021) Detailed reference viewed: 46 (0 UL)![]() Biryukov, Alexei ![]() ![]() ![]() in Topics in Cryptology – CT-RSA 2021 (2021) In this paper we cryptanalyse the two accumulator variants proposed by Au et al., which we call the alpha-based construction and the common reference string-based (CRS-based) construction. We show that if ... [more ▼] In this paper we cryptanalyse the two accumulator variants proposed by Au et al., which we call the alpha-based construction and the common reference string-based (CRS-based) construction. We show that if non-membership witnesses are issued according to the alpha-based construction, an attacker that has access to multiple witnesses is able to efficiently recover the secret accumulator parameter alpha and completely break its security. More precisely, if p is the order of the underlying bilinear group, the knowledge of O(log p log log p) non-membership witnesses permits to successfully recover alpha. Further optimizations and different attack scenarios allow to reduce the number of required witnesses to O(log p), together with practical attack complexity. Moreover, we show that accumulator's collision resistance can be broken if just one of these non-membership witnesses is known to the attacker. We then show how all these attacks for the alpha-based construction can be easily prevented by using instead a corrected expression for witnesses. Although outside the original security model assumed by Au \etal but motivated by some possible concrete application of the scheme where the Manager must have exclusive rights for issuing witnesses (e.g. white/black list based authentication mechanisms), we show that if non-membership witnesses are issued using the CRS-based construction and the CRS is kept secret by the Manager, an attacker accessing multiple witnesses can reconstruct the CRS and compute witnesses for arbitrary new elements. In particular, if the accumulator is initialized by adding m secret elements, the knowledge of m non-membership witnesses allows to succeed in such attack. [less ▲] Detailed reference viewed: 42 (11 UL)![]() Neframi, Eleftheria ![]() in Revue des Affaires Européennes (2021) The European Union’s role in international health issues is of particular importance in the context of the Covid-19 pandemic. The Union aims to strengthen global health policy, in order to build a ... [more ▼] The European Union’s role in international health issues is of particular importance in the context of the Covid-19 pandemic. The Union aims to strengthen global health policy, in order to build a European Health Union and consolidate its role in the international scene. Article 168 TFEU enables the Union to collaborate with international organisations and partner countries and to participate in the WHO governing bodies despite the absence of full party status. The alignment of internal policies with the objective of protection and improvement of human health gives the Union the implied external competence to participate in international agreements and envisage its active role in the elaboration of an international pandemic treaty. Besides, the Union has recourse to international trade measures in order to preserve the level of human health protection. The global approach of its external action objectives enables the Union to promote human health protection as a value in the conduct of its external policies and to support partner countries in their response to health threats. The Union gradually becomes a unified actor in global health security preparedness and response capacity. [less ▲] Detailed reference viewed: 26 (2 UL)![]() Zetzsche, Dirk Andreas ![]() Book published by WoltersKluwer - 4 (2021) Detailed reference viewed: 13 (0 UL)![]() ; ; Cordy, Maxime ![]() in SPLC '21: 25th ACM International Systems and Software Product Line Conference, Leicester, United Kindom, September 6-11, 2021, Volume B (2021) Detailed reference viewed: 40 (0 UL)![]() Allegrezza, Silvia ![]() in Revue Pénale Luxembourgeoise (2021) Detailed reference viewed: 24 (2 UL)![]() Andersen, Katja Natalie ![]() in KiTa aktuell HRS - Fachzeitschrift für Leitungen, Fachkräfte und Träger der Kindertagesbetreuung (2021), 29(12), 281 Detailed reference viewed: 19 (0 UL)![]() Daoudi, Nadia ![]() ![]() ![]() in Communications in Computer and Information Science (2021) Computer vision has witnessed several advances in recent years, with unprecedented performance provided by deep representation learning research. Image formats thus appear attractive to other fields such ... [more ▼] Computer vision has witnessed several advances in recent years, with unprecedented performance provided by deep representation learning research. Image formats thus appear attractive to other fields such as malware detection, where deep learning on images alleviates the need for comprehensively hand-crafted features generalising to different malware variants. We postulate that this research direction could become the next frontier in Android malware detection, and therefore requires a clear roadmap to ensure that new approaches indeed bring novel contributions. We contribute with a first building block by developing and assessing a baseline pipeline for image-based malware detection with straightforward steps. We propose DexRay, which converts the bytecode of the app DEX files into grey-scale “vector” images and feeds them to a 1-dimensional Convolutional Neural Network model. We view DexRay as foundational due to the exceedingly basic nature of the design choices, allowing to infer what could be a minimal performance that can be obtained with image-based learning in malware detection. The performance of DexRay evaluated on over 158k apps demonstrates that, while simple, our approach is effective with a high detection rate(F1-score= 0.96). Finally, we investigate the impact of time decay and image-resizing on the performance of DexRay and assess its resilience to obfuscation. This work-in-progress paper contributes to the domain of Deep Learning based Malware detection by providing a sound, simple, yet effective approach (with available artefacts) that can be the basis to scope the many profound questions that will need to be investigated to fully develop this domain. [less ▲] Detailed reference viewed: 131 (24 UL)![]() Menetrey, Séverine ![]() in Journal des Tribunaux (2021) Detailed reference viewed: 43 (1 UL)![]() Kumar, Sumit ![]() ![]() in 15th European Conference on Antennas and Propagation (EuCAP) (2021) We consider a communications-centric spectrum sharing scenario where the communications link has a minimum service constraint in throughput and the radar maximizes its receive signal-to-interference-plus ... [more ▼] We consider a communications-centric spectrum sharing scenario where the communications link has a minimum service constraint in throughput and the radar maximizes its receive signal-to-interference-plus-noise ratio (SINR). Prior works on joint power, allocation indicate that, under a communication-centric scenario, radar transmit power is gradually reduced as the throughput demand for communications link increases. Such an approach results in severe degradation of radar SINR, especially when the communications link suffers an outage. We propose methods based on successive-interference-cancellation to improve the radar SINR. This comprises both coexistence and coordination approaches. Numerical experiments show significant improvement in radar SINR when communications throughput demand rises and eventually goes into the outage. [less ▲] Detailed reference viewed: 54 (11 UL)![]() Vitto, Giuseppe ![]() E-print/Working paper (2021) Detailed reference viewed: 65 (5 UL) |
||