Loading...
  • Home
  • Search Results
1335-1336 of 4327 Papers

AN ANALYTIC POTENTIAL SOLUTION TO GE/SI CORE/SHELL FIELD EFFECT METAL-OXIDE-SEMICONDUCTOR STRUCTURE

Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, ELECTRONICS AND ELECTRICAL TECHNOLOGY
Author(s): CAIXIA DU , JIN HE , JIN YANG , MANSUN CHAN , WANNING DENG , WEI ZHAO , WEN WU , WENPING WANG , XUEHAO MOU , YUN YE , LINING ZHANG

Abstract: Radial core/shell hetero field effect metal-oxide-semiconductor structures, especially Ge/Si core/shell structure, have recently been extensively studied both experimentally and theoretically, promising novel electronic and optoelectronic devices. An analytic electrostatic potential solution to this hetero-structure is developed in this letter. The analytical expression of the electrostatic potential is derived out from the basic Poisson Boltzmann equation in the core/shell layers under classical device physics. Potential and electric field distribution across the radial of the core/shell structure are analyzed and discussed in the detail, much different from their single component counterpart. The analytic solution presented in this letter has provided useful insight for device scientists and integrated circuit engineers to understand the device physics and further develop compact circuit models of nano-wire field effect transistors with the Ge/Si core/shell hetero-structure for possi

  • Publication Date: 03-Aug-2014
  • DOI: 10.15224/978-1-63248-005-7-54
  • Views: 0
  • Downloads: 0

ADVANCED PERSISTENT THREAT ATTACK DETECTION: AN OVERVIEW

Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, ELECTRONICS AND ELECTRICAL TECHNOLOGY
Author(s): IBRAHIM GHAFIR , VACLAV PRENOSIL

Abstract: With the webs explosive growth in power and popularity has come a concomitant increase in both the number and impact of cyber criminals. For years businesses have striven to keep malware, spam and unwanted intruders at bay with varying degrees of success. Cyber criminals and spies in turn created more advanced means to breach the security measures. APTs are a new and more sophisticated version of known multistep attack scenarios and they are targeted specifically to achieve a specific goal, most often espionage. The financial loss caused by APT attacks can be very big. Moreover, these APTs form a problem for the current detection methods because these methods depend on known signatures of attacks and APTs make heavy use of unknown security holes for attacks. In this paper we present an overview of the current researches about APT attack detection. In addition, we provide a classification of these researches into three groups which are previous research findings on APT attack, Analyzing

  • Publication Date: 03-Aug-2014
  • DOI: 10.15224/978-1-63248-005-7-55
  • Views: 0
  • Downloads: 0