IoT applications span a wide range in performance and memory footprint, under tight cost and power constraints.
Our complimentary approach is to also deploy defenses that seek to maximize the consumption of the attackers' time and other resources while causing as little damage as possible to the victim.
Cryptography and Security
We then create a typology of relationships between political communities based on whether their users are toxic to each other, whether echo chamber-like engagement with these communities is associated with polarization, and on the communities' political leanings.
Computers and Society Social and Information Networks
Censorship, anti-censorship, and self-censorship in an authoritarian regime have been extensively studies, yet the relationship between these intertwined factors is not well understood.
Computers and Society Social and Information Networks Applications
Chips with hundreds to thousands of cores require scalable networks-on-chip (NoCs).
Hardware Architecture Distributed, Parallel, and Cluster Computing Networking and Internet Architecture
Side-channel attacks pose serious threats to many security models, especially sandbox-based browsers.
Cryptography and Security Hardware Architecture
We achieved a resonant amplitude gain of 5 to 7 times the input amplitude and tripled the high-gain frequency range comparedto a foil with fixed stiffness.