Safeguarding the IoT From Malware Epidemics: A Percolation Theory Approach
Related publications (32)
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Active Debris Removal missions consist of sending a satellite in space and removing one or more debris from their current orbit. A key challenge is to obtain information about the uncooperative target. By gathering the velocity, position, and rotation of t ...
The viable and safe application of wireless power transfer for powering bioelectronic implants requires understanding the wave propagation in heterogeneous and dispersive media, the electromagnetic exposure assessment, and the optimum design of the system ...
n-linear impedance characteristics of VO2 offer solutions to highly sensitive radio-frequency (RF), millimeterwave (mm-wave), and terahertz (THz) detectors. We demonstrate high-speed broadband sensibility of miniaturized VO2 switches by utilizing the nonli ...
The increase in wireless data traffic continues and is a product of several factors. First, new technologies and capabilities enable new use cases for which new products emerge. Then, with the growing user adoption over time, the data traffic is further in ...
The drainage process in the gas diffusion layer (GDL) of proton exchange membrane (PEM) fuel cells is investigated with an ex situ experimental approach. The drainage process is investigated for stable displacement, capillary fingering, and viscous fingeri ...
In this thesis, we consider an anisotropic finite-range bond percolation model on Z2. On each horizontal layer {(x,i):x∈Z} for i∈Z, we have edges ⟨(x,i),(y,i)⟩ for 1≤∣x−y∣≤N with $N\in\mathbb{N ...
We provide a comprehensive quantitative analysis of localized and extended topological defects in the steady state of 2D passive and active repulsive Brownian disk systems. We show that, both in and out-of-equilibrium, the passage from the solid to the hex ...
The viscoelastic behavior of dilute suspensions of reduced graphene oxide (RGO) nanoparticles in a liquid SU8 epoxy dissolved in gamma butyrolactone was investigated at RGO concentrations in the range from 0.16 to 1.07 vol. %. Our results revealed that the ...
There is an increasing interest in a fast-growing machine learning technique called Federated Learning (FL), in which the model training is distributed over mobile user equipment (UEs), exploiting UEs' local computation and training data. Despite its advan ...
The infiltration of a non-wetting liquid, such as molten metal, into a porous solid, such as a ceramic preform, is influenced by the wetting angle of the liquid on the solid. The link between local wetting and the minimum pressure required for initiation o ...