Linked or unlinked: A systematic review of linkable ring signature schemes
As a prominent cryptographic primitive underlying anonymous communication, privacy-
preserving cryptocurrencies, and other blockchain-based applications, ring signatures have …
preserving cryptocurrencies, and other blockchain-based applications, ring signatures have …
Management of Next-Generation Sequencing in Precision Medicine
Next-generation sequencing (NGS) has transformed DNA sequencing in terms of speed and
data volume, rendering genomics affordable and achievable by individual laboratories …
data volume, rendering genomics affordable and achievable by individual laboratories …
Research on network security protection of application-oriented supercomputing center based on multi-level defense and moderate principle
B Yang, Y Yu, Z Wang, S Li, H **ao… - Journal of Physics …, 2021 - iopscience.iop.org
Abstract High Performance Computing (HPC), also known as Supercomputing, is widely
applied in various fields, which have the advantage of high processing capability and mass …
applied in various fields, which have the advantage of high processing capability and mass …
[PDF][PDF] Enhancing High-Performance Computing (HPC) Security: A Compre-hensive Review of Detection and Protection Strategies
The escalating demand for High-Performance Computing (HPC) systems and data analysis
across diverse scientific domains has amplified network security issues that need to be …
across diverse scientific domains has amplified network security issues that need to be …
Securing Critical Cyber Infrastructures and Functionalities via Machine Learning Empowered Strategies
T Hou - 2022 - search.proquest.com
Securing Critical Cyber Infrastructures and Functionalities via Machine Learning Empowered
Strategies by Tao Hou A dissertation Page 1 Securing Critical Cyber Infrastructures and …
Strategies by Tao Hou A dissertation Page 1 Securing Critical Cyber Infrastructures and …
Architecture of security protection technology for aviation cyberspace
W Zhong-hua, M Jian-feng… - 2020 7th International …, 2020 - ieeexplore.ieee.org
Under the systematic combat mode, aviation cyberspace is a complicated, dynamic and
confrontational information space. How to evaluate network security situation efficiently and …
confrontational information space. How to evaluate network security situation efficiently and …
[PDF][PDF] Cybersecurity Concerns of Artificial Intelligence Applications on High-Performance Computing Systems
R Saxena, A Baskar, S Haroon, S Hayat… - researchgate.net
The High-Performance Computing (HPC) landscape is undergoing profound changes with
developments in fastgrowing domains such as Artificial Intelligence (AI), cloud, edge …
developments in fastgrowing domains such as Artificial Intelligence (AI), cloud, edge …
[PDF][PDF] High Performance Computing (HPC) System Security: Threats and Vulnerabilities, Challenges and Solutions
S Koleini, I Shiraz, B Pahlevanzadeh - researchgate.net
The escalating demand for High-Performance Computing (HPC) systems and data analysis
across diverse scientific domains has amplified network security issues. This study provides …
across diverse scientific domains has amplified network security issues. This study provides …
[PDF][PDF] Security Infrastructures and intrusion systems
M Mildenberger - 2023 - hps.vi4io.org
In this paper, an overview of intrusion detection for high-performance clusters is provided.
After a description of the architecture of high-performance clusters, aspects of intrusion …
After a description of the architecture of high-performance clusters, aspects of intrusion …