Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    High Data Throughput Exfiltration Through Video Cable Emanations

    The present work investigates the feasibility to exfiltrate a large amount of data from a computer by leveraging the unintended electromagnetic emanations of an HDMI cable to reconstruct its content. The low s...

    Llorenç Romá Álvarez, Daniel Moser in Critical Information Infrastructures Secur… (2023)

  2. No Access

    Chapter and Conference Paper

    Preoperative Prediction of Lymph Node Metastasis from Clinical DCE MRI of the Primary Breast Tumor Using a 4D CNN

    In breast cancer, undetected lymph node metastases can spread to distal parts of the body for which the 5-year survival rate is only 27%, making accurate nodal metastases diagnosis fundamental to reducing the ...

    Son Nguyen, Dogan Polat, Paniz Karbasi in Medical Image Computing and Computer Assis… (2020)

  3. No Access

    Chapter

    swarmFSTaxis: Borrowing a Swarm Communication Mechanism from Fireflies and Slime Mold

    One main motivation for studying swarm intelligence comes from observing the resilience of living systems in nature. Swarm intelligence has provided important inspirations for the engineering of technical syst...

    Joshua Cherian Varughese, Daniel Moser, Ronald Thenius in Complex Adaptive Systems (2019)

  4. No Access

    Chapter and Conference Paper

    subCULTron - Cultural Development as a Tool in Underwater Robotics

    This paper presents the research done in the field of robotic cultural evolution in challenging real world environments. We hereby present these efforts, as part of project subCULTron, where we will create an ...

    Ronald Thenius, Daniel Moser in Artificial Life and Intelligent Agents (2018)

  5. No Access

    Chapter and Conference Paper

    Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS

    Recent research has shown that a number of existing wireless avionic systems lack encryption and are thus vulnerable to eavesdrop** and message injection attacks. The Aircraft Communications Addressing and R...

    Matthew Smith, Daniel Moser, Martin Strohmeier in Financial Cryptography and Data Security (2017)