Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Context. The carbon monoxide (CO) molecular line at around 46655 Å in solar infrared spectra is often used to investigate the dynamic behavior of the cold heart of the solar atmosphere, i.e., sunspot oscillation, especially at the sunspot umbra. Aims. We investigated sunspot oscillation at Doppler velocities of the CO 7-6 R67 and 3-2 R14 lines that were measured by the Cryogenic Infrared Spectrograph (CYRA), as well as the line profile of Mg II k line that was detected by the Interface Region Imaging Spectrograph (IRIS). Methods. A single Gaussian function is applied to each CO line profile to extractmore »
-
Processors nowadays are consistently equipped with debugging features to facilitate the program analysis. Specifically, the ARM debugging architecture involves a series of CoreSight components and debug registers to aid the system debugging, and a group of debug authentication signals are designed to restrict the usage of these components and registers. Meantime, the security of the debugging features is under-examined since it normally requires physical access to use these features in the traditional debugging model. However, ARM introduces a new debugging model that requires no physical access since ARMv7, which exacerbates our concern on the security of the debugging features. Inmore »
-
With the proliferation of using smart and connected devices in the transportation domain, these systems inevitably face security threats from the real world. In this work, we analyze the security of the existing traffic signal systems and summarize the security implications exposed in our analysis. Our research shows that the deployed traffic signal systems can be easily manipulated with physical/remote access and are vulnerable to an array of real-world attacks such as a diversionary tactic. By setting up a standard traffic signal system locally in our lab and partnering with a municipality, we demonstrate that not only can traffic intersectionsmore »