Topic Review
Control Flow Graph
A control flow graph (CFG) in computer science is a representation, using graph notation, of all paths that might be traversed through a program during its execution. The control flow graph is due to Frances E. Allen, who notes that Reese T. Prosser used boolean connectivity matrices for flow analysis before. The CFG is essential to many compiler optimizations and static analysis tools.
  • 3.4K
  • 28 Sep 2022
Topic Review
Stuxnet
Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsible for causing substantial damage to the nuclear program of Iran. Although neither country has openly admitted responsibility, the worm is widely understood to be a cyberweapon built jointly by the United States and Israel in a collaborative effort known as Operation Olympic Games. Stuxnet specifically targets programmable logic controllers (PLCs), which allow the automation of electromechanical processes such as those used to control machinery and industrial processes including gas centrifuges for separating nuclear material. Exploiting four zero-day flaws, Stuxnet functions by targeting machines using the Microsoft Windows operating system and networks, then seeking out Siemens Step7 software. Stuxnet reportedly compromised Iranian PLCs, collecting information on industrial systems and causing the fast-spinning centrifuges to tear themselves apart. Stuxnet's design and architecture are not domain-specific and it could be tailored as a platform for attacking modern SCADA and PLC systems (e.g., in factory assembly lines or power plants), most of which are in Europe, Japan , and the United States. Stuxnet reportedly ruined almost one-fifth of Iran's nuclear centrifuges. Targeting industrial control systems, the worm infected over 200,000 computers and caused 1,000 machines to physically degrade. Stuxnet has three modules: a worm that executes all routines related to the main payload of the attack; a link file that automatically executes the propagated copies of the worm; and a rootkit component responsible for hiding all malicious files and processes, to prevent detection of Stuxnet. It is typically introduced to the target environment via an infected USB flash drive, thus crossing any air gap. The worm then propagates across the network, scanning for Siemens Step7 software on computers controlling a PLC. In the absence of either criterion, Stuxnet becomes dormant inside the computer. If both the conditions are fulfilled, Stuxnet introduces the infected rootkit onto the PLC and Step7 software, modifying the code and giving unexpected commands to the PLC while returning a loop of normal operation system values back to the users.
  • 3.4K
  • 30 Nov 2022
Topic Review
Battery Modelling Techniques
The battery modelling (BM) problem is a constrained, multi-dimensional, mixed variable, non-convex, non-linear optimisation problem. Many bio-inspired techniques have been successfully employed to estimate the battery parameters. When bio-inspired algorithms are implemented for COM to extract parameters in real time, then they are called grey box models.
  • 3.4K
  • 28 Oct 2021
Topic Review
Bitcoin Core
Bitcoin Core is free and open-source software that serves as a bitcoin node (the set of which form the bitcoin network) and provides a bitcoin wallet which fully verifies payments. It is considered to be bitcoin's reference implementation. Initially, the software was published by Satoshi Nakamoto under the name "Bitcoin", and later renamed to "Bitcoin Core" to distinguish it from the network. For this reason, it is also known as the Satoshi client. The MIT Digital Currency Initiative funds some of the development of Bitcoin Core. The project also maintains the cryptography library libsecp256k1.
  • 3.4K
  • 09 Nov 2022
Topic Review
Make
In software development, Make is a build automation tool that automatically builds executable programs and libraries from source code by reading files called Makefiles which specify how to derive the target program. Though integrated development environments and language-specific compiler features can also be used to manage a build process, Make remains widely used, especially in Unix and Unix-like operating systems. Besides building programs, Make can be used to manage any project where some files must be updated automatically from others whenever the others change.
  • 3.4K
  • 28 Sep 2022
Topic Review
Video Games in Education
This page includes some history of video games being used as an additional or alternative method to traditional education. This page presents why using video games are beneficial to use for educational purposes in the classroom as well as the limitations. This page additionally discusses how learning from video games outside the classroom is possible as well.
  • 3.4K
  • 04 Nov 2022
Topic Review
Building Domain-Specific Search Engines
With advances in machine learning, knowledge discovery systems have become very complicated to set up, requiring extensive tuning and programming effort. Democratizing such technology so that non-technical domain experts can avail themselves of these advances in an interactive and personalized way is an important problem. myDIG is a highly modular, open source pipeline-construction system that is specifically geared towards investigative users (e.g., law enforcement) with no programming abilities. The myDIG system allows users both to build a knowledge graph of entities, relationships, and attributes for illicit domains from a raw HTML corpus and also to set up a personalized search interface for analyzing the structured knowledge. Both qualitative and quantitative data from five case studies involving investigative experts from illicit domains, such as securities fraud and illegal firearms sales, have been used to illustrate the potential of myDIG.
  • 3.4K
  • 10 Feb 2021
Topic Review
Digital Literacy
Digital literacy refers to an individual's ability to find, evaluate, and compose clear information through writing and other media on various digital platforms. Digital literacy is evaluated by an individual's grammar, composition, typing skills and ability to produce text, images, audio and designs using technology. While digital literacy initially focused on digital skills and stand-alone computers, the advent of the internet and use of social media, has caused some of its focus to shift to mobile devices. Similar to other expanding definitions of literacy that recognize cultural and historical ways of making meaning, digital literacy does not replace traditional forms of literacy, and instead builds upon and expands the skills that form the foundation of traditional forms of literacy. Digital literacy should be considered to be a part of the path to knowledge. Digital literacy is built on the expanding role of social science research in the field of literacy as well as on concepts of visual literacy, computer literacy, and information literacy. Overall, digital literacy shares many defining principles with other fields that use modifiers in front of literacy to define ways of being and domain specific knowledge or competence. The term has grown in popularity in education and higher education settings and is used in both international and national standards.
  • 3.4K
  • 31 Oct 2022
Topic Review
Yao's Millionaires' Problem
Yao's Millionaires' problem is a secure multi-party computation problem which was introduced in 1982 by computer scientist and computational theorist Andrew Yao. The problem discusses two millionaires, Alice and Bob, who are interested in knowing which of them is richer without revealing their actual wealth. This problem is analogous to a more general problem where there are two numbers [math]\displaystyle{ a }[/math] and [math]\displaystyle{ b }[/math] and the goal is to determine whether the inequality [math]\displaystyle{ a \geq b }[/math] is true or false without revealing the actual values of [math]\displaystyle{ a }[/math] and [math]\displaystyle{ b }[/math]. The Millionaires' Problem is an important problem in cryptography, the solution of which is used in e-commerce and data mining. Commercial applications sometimes have to compare numbers which are confidential and whose security is important. Many solutions have been introduced for the problem, among which the first solution, presented by Yao himself, was exponential in time and space.
  • 3.3K
  • 15 Nov 2022
Topic Review
Android Malware Detection Using ML
This systematic review discussed ML-based Android malware detection techniques. It critically evaluated 106 carefully selected articles and highlighted their strengths and weaknesses as well as potential improvements. The ML-based methods for detecting source code vulnerabilities were also discussed, because it might be more difficult to add security after the app is deployed. Therefore, this paper aimed to enable researchers to acquire in-depth knowledge in the field and to identify potential future research and development directions.
  • 3.3K
  • 19 Aug 2021
  • Page
  • of
  • 371
Video Production Service