The relation between superconductivity and time-reversal symmetry is one of the most fascinating problems in condensed-matter physics. Here we report an anomalous transport behavior in superconducting Josephson juncti...
详细信息
The relation between superconductivity and time-reversal symmetry is one of the most fascinating problems in condensed-matter physics. Here we report an anomalous transport behavior in superconducting Josephson junctions induced by surface disorder. We fabricate vertical Josephson junctions using metallic superconductor (Al) and ion-bombarded Sr2RuO4. Below the superconducting transition temperature, we observe persistent magnetoresistive hysteresis behavior dependent on the disorder deposition time. Field- and temperature-dependent measurements suggest that the observed effects arise from disorder-induced anomalous flux in Sr2RuO4 which can be sensitively detected by superconducting Al. To account for the observed findings, we consider different physical scenarios such as interband surface pairing reconstruction, magnetic surface states, and vortex phases.
Network stealth events are endless,and covert timing channel is one of the most difficult means to *** order to further improve the detection rate of covert timing channel,several typical network covert timing channel...
详细信息
Network stealth events are endless,and covert timing channel is one of the most difficult means to *** order to further improve the detection rate of covert timing channel,several typical network covert timing channel construction algorithms are *** the basis of the above analysis,a detection method based on IPDs multidimensional features was proposed in this *** of covert timing channels from three dimensions:shape,change rule and data statistics are ***,polarization feature,autocorrelation feature,clustering feature are proposed,and the three features are unified into a *** threshold method is used to determine whether the channel to be detected is a normal *** show that the method can detect the existing covert timing channel with less time cost and compared with the traditional detection method has a certain rate of improvement.
Network attacks using advanced local hiding technology have not only increased, but also become a serious threat. However, attacks using these technologies can not be detected through traffic detection, and some attac...
详细信息
Network attacks using advanced local hiding technology have not only increased, but also become a serious threat. However, attacks using these technologies can not be detected through traffic detection, and some attacks imitate benign traffic to avoid detection. To solve these problems, a malware process detection method based on process behavior in possibly infected terminals is proposed. In this method, a deep neural network is introduced to classify malware processes. Firstly, the recurrent neural network is trained to extract the characteristics of process behavior. Secondly, training convolutional neural network is used to classify feature images generated by trained RNN features. The experiments results show that this method can effectively extract the features of malicious processes, and the AUC of ROC curve is 0.97 in the best case.
With the popularization of social networks, as a low-cost, high-efficiency entail attack method, most of the attack vectors were embedded in email attachments, and exploited vulnerability on Adobe and Office software....
详细信息
Short text datum, which contains a lot of useful information, could be easily found on a wide variety of self-media platform and social communication tools. on It is significant to use datum mining technology to autom...
详细信息
Nowadays, the cyberspace security situation is unoptimistic. Widespread vulnerabilities and backdoors are the main factors of insecurity in cyberspace. Furthermore, the software monoculture makes the attack have an ex...
详细信息
Targeted at the situation of rampant attack on UEFI Platform Firmware, this paper summarizes the UEFI platform firmware framework structure as well as its potential security problems. Then the vulnerability factors of...
详细信息
How to locate the target function faster and more accurately is a key problem of Automatic Reverse-engineering of Software Programs. In order to solve this problem, a target function location method based on code cove...
详细信息
This brief explores the approximation properties of a unique basis expansion based on Pascal's triangle, which realizes a sampled-data driven approach between a continuous-time signal and its discrete-time represe...
详细信息
ISBN:
(数字)9781728158556
ISBN:
(纸本)9781728158563
This brief explores the approximation properties of a unique basis expansion based on Pascal's triangle, which realizes a sampled-data driven approach between a continuous-time signal and its discrete-time representation. The roles of certain parameters, such as sampling time interval or model order, and signal characteristics, i.e., its curvature, on the approximation are investigated. Approximate errors in one and multiple-step predictions are analyzed. Furthermore, time-variant approximations under the thresholds of signal curvature are employed to narrow errors and provide flexibilities.
Aiming at the cryptographic algorithm that may be contained in the binary program, combined with existing research results, several cryptographic algorithm identification techniques are analyzed, including control flo...
Aiming at the cryptographic algorithm that may be contained in the binary program, combined with existing research results, several cryptographic algorithm identification techniques are analyzed, including control flow graphs, data flow graphs, feature matching, selection of command statistical attributes, and semantic-based behavior analysis. The recognition effects of related technologies are discussed respectively.
暂无评论