Linked or unlinked: A systematic review of linkable ring signature schemes

J Odoom, X Huang, Z Zhou, S Danso, J Zheng… - Journal of Systems …, 2023 - Elsevier
As a prominent cryptographic primitive underlying anonymous communication, privacy-
preserving cryptocurrencies, and other blockchain-based applications, ring signatures have …

Management of Next-Generation Sequencing in Precision Medicine

SC Tan, H Neoh, MY Ang, MAK Sharzehan… - Regionalized …, 2022 - Springer
Next-generation sequencing (NGS) has transformed DNA sequencing in terms of speed and
data volume, rendering genomics affordable and achievable by individual laboratories …

Research on network security protection of application-oriented supercomputing center based on multi-level defense and moderate principle

B Yang, Y Yu, Z Wang, S Li, H **ao… - Journal of Physics …, 2021 - iopscience.iop.org
Abstract High Performance Computing (HPC), also known as Supercomputing, is widely
applied in various fields, which have the advantage of high processing capability and mass …

[PDF][PDF] Enhancing High-Performance Computing (HPC) Security: A Compre-hensive Review of Detection and Protection Strategies

S Koleini, B Pahlevanzadeh, I Shiraz - Journal of Distributed Computing and …, 2024 - jdcs.ir
The escalating demand for High-Performance Computing (HPC) systems and data analysis
across diverse scientific domains has amplified network security issues that need to be …

Securing Critical Cyber Infrastructures and Functionalities via Machine Learning Empowered Strategies

T Hou - 2022 - search.proquest.com
Securing Critical Cyber Infrastructures and Functionalities via Machine Learning Empowered
Strategies by Tao Hou A dissertation Page 1 Securing Critical Cyber Infrastructures and …

Architecture of security protection technology for aviation cyberspace

W Zhong-hua, M Jian-feng… - 2020 7th International …, 2020 - ieeexplore.ieee.org
Under the systematic combat mode, aviation cyberspace is a complicated, dynamic and
confrontational information space. How to evaluate network security situation efficiently and …

[PDF][PDF] Cybersecurity Concerns of Artificial Intelligence Applications on High-Performance Computing Systems

R Saxena, A Baskar, S Haroon, S Hayat… - researchgate.net
The High-Performance Computing (HPC) landscape is undergoing profound changes with
developments in fastgrowing domains such as Artificial Intelligence (AI), cloud, edge …

[PDF][PDF] High Performance Computing (HPC) System Security: Threats and Vulnerabilities, Challenges and Solutions

S Koleini, I Shiraz, B Pahlevanzadeh - researchgate.net
The escalating demand for High-Performance Computing (HPC) systems and data analysis
across diverse scientific domains has amplified network security issues. This study provides …

[PDF][PDF] Security Infrastructures and intrusion systems

M Mildenberger - 2023 - hps.vi4io.org
In this paper, an overview of intrusion detection for high-performance clusters is provided.
After a description of the architecture of high-performance clusters, aspects of intrusion …