Works matching DE "HARDWARE Trojans (Computers)"
Results: 53
Trojan playground: a reinforcement learning framework for hardware Trojan insertion and detection.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 10, p. 14295, doi. 10.1007/s11227-024-05963-8
- By:
- Publication type:
- Article
Design and analysis of hardware Trojans in approximate circuits.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2022, v. 58, n. 5, p. 197, doi. 10.1049/ell2.12405
- By:
- Publication type:
- Article
Hardware Trojan Dataset of RISC-V and Web3 Generated with ChatGPT-4.
- Published in:
- Data (2306-5729), 2024, v. 9, n. 6, p. 82, doi. 10.3390/data9060082
- By:
- Publication type:
- Article
Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAs.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 3, p. 36, doi. 10.3390/cryptography8030036
- By:
- Publication type:
- Article
A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 3, p. 34, doi. 10.3390/cryptography8030034
- By:
- Publication type:
- Article
A Review on HT Attacks in PLD and ASIC Designs with Potential Defence Solutions.
- Published in:
- IETE Technical Review, 2018, v. 35, n. 1, p. 64, doi. 10.1080/02564602.2016.1246385
- By:
- Publication type:
- Article
Cryptanalysis of WG Family of Stream Ciphers.
- Published in:
- Computer Journal, 2015, v. 58, n. 10, p. 2677, doi. 10.1093/comjnl/bxv024
- By:
- Publication type:
- Article
Enhancing IoT security through network softwarization and virtual security appliances.
- Published in:
- International Journal of Network Management, 2018, v. 28, n. 5, p. 1, doi. 10.1002/nem.2038
- By:
- Publication type:
- Article
Distributed Shadow for Router Security Defense.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2018, v. 28, n. 2, p. 193, doi. 10.1142/S021819401840003X
- By:
- Publication type:
- Article
Simulation for strategic hardware Trojans testing.
- Published in:
- EE: Evaluation Engineering, 2018, v. 57, n. 3, p. 18
- By:
- Publication type:
- Article
전자기/회로 공동 시뮬레이션을 이용한하드웨어트로이목마신호탈취 시스템의모델링.
- Published in:
- Journal of Korean Institute of Electromagnetic Engineering & Science / Han-Guk Jeonjapa Hakoe Nonmunji, 2024, v. 35, n. 8, p. 622, doi. 10.5515/KJKIEES.2024.35.8.622
- By:
- Publication type:
- Article
A case study in hardware Trojan design and implementation.
- Published in:
- 2011
- By:
- Publication type:
- Case Study
A THEMATIC REVIEW OF USER COMPLIANCE WITH INFORMATION SECURITY POLICIES LITERATURE.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, p. 101
- By:
- Publication type:
- Article
Malware Analysis and Classification Using Sequence Alignments.
- Published in:
- Intelligent Automation & Soft Computing, 2016, v. 22, n. 3, p. 371, doi. 10.1080/10798587.2015.1118916
- By:
- Publication type:
- Article
Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation.
- Published in:
- Journal of Electronic Testing, 2011, v. 27, n. 6, p. 767, doi. 10.1007/s10836-011-5255-2
- By:
- Publication type:
- Article
Hardware Trojan detection and localization based on local detectors.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2018, v. 26, n. 3, p. 1403, doi. 10.3906/elk-1703-81
- By:
- Publication type:
- Article
Hardware Trojans detection in chaos-based cryptography.
- Published in:
- Bulletin of the Polish Academy of Sciences: Technical Sciences, 2017, v. 65, n. 5, p. 725, doi. 10.1515/bpasts-2017-0078
- By:
- Publication type:
- Article
On the Effectiveness of Hardware Trojan Horse Detection via Side-Channel Analysis.
- Published in:
- Information Security Journal: A Global Perspective, 2013, v. 22, n. 5/6, p. 226, doi. 10.1080/19393555.2014.891277
- By:
- Publication type:
- Article
NETWORK SECURITY PROBLEMS ON LAYER 2.
- Published in:
- Military Engineer / Hadmérnök, 2013, v. 8, n. 1, p. 274
- By:
- Publication type:
- Article
Predictive over-current protection scheme for step-down DC-DC converter with emulated current mode control.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2016, v. 52, n. 15, p. 1329, doi. 10.1049/el.2016.1390
- By:
- Publication type:
- Article
Using the 0-1 test for chaos to detect hardware trojans in chaotic bit generators.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2016, v. 52, n. 11, p. 919, doi. 10.1049/el.2016.0861
- By:
- Publication type:
- Article
Securing FPGAs in IoT: a new run-time monitoring technique against hardware Trojan.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 6, p. 5455, doi. 10.1007/s11276-023-03305-9
- By:
- Publication type:
- Article
Group Key Authentication scheme for Vanet INtrusion detection (GKAVIN).
- Published in:
- Wireless Networks (10220038), 2017, v. 23, n. 3, p. 935, doi. 10.1007/s11276-016-1197-z
- By:
- Publication type:
- Article
A Side-Channel Analysis for Hardware Trojan Detection Based on Path Delay Measurement.
- Published in:
- Journal of Circuits, Systems & Computers, 2018, v. 27, n. 9, p. -1, doi. 10.1142/S0218126618501384
- By:
- Publication type:
- Article
HT-PGFV: Security-Aware Hardware Trojan Security Property Generation and Formal Security Verification Scheme.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 21, p. 4286, doi. 10.3390/electronics13214286
- By:
- Publication type:
- Article
A Hardware Trojan Diagnosis Method for Gate-Level Netlists Based on Graph Theory.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 12, p. 2400, doi. 10.3390/electronics13122400
- By:
- Publication type:
- Article
Creation and Detection of Hardware Trojans Using Non-Invasive Off-The-Shelf Technologies.
- Published in:
- Electronics (2079-9292), 2018, v. 7, n. 7, p. 124, doi. 10.3390/electronics7070124
- By:
- Publication type:
- Article
E<sup>2</sup>LEMI:Energy-Efficient Logic Encryption Using Multiplexer Insertion.
- Published in:
- Electronics (2079-9292), 2017, v. 6, n. 1, p. 16, doi. 10.3390/electronics6010016
- By:
- Publication type:
- Article
Editorial.
- Published in:
- Journal of Electronic Testing, 2024, v. 40, n. 6, p. 689, doi. 10.1007/s10836-024-06156-0
- By:
- Publication type:
- Article
A Feature-Adaptive and Scalable Hardware Trojan Detection Framework For Third-party IPs Utilizing Multilevel Feature Analysis and Random Forest.
- Published in:
- Journal of Electronic Testing, 2024, v. 40, n. 6, p. 741, doi. 10.1007/s10836-024-06150-6
- By:
- Publication type:
- Article
Towards the Detection of Hardware Trojans with Cost Effective Test Vectors using Genetic Algorithm.
- Published in:
- Journal of Electronic Testing, 2024, v. 40, n. 3, p. 371, doi. 10.1007/s10836-024-06122-w
- By:
- Publication type:
- Article
Hardware Trojan Detection Using an Advised Genetic Algorithm Based Logic Testing.
- Published in:
- Journal of Electronic Testing, 2018, v. 34, n. 4, p. 461, doi. 10.1007/s10836-018-5739-4
- By:
- Publication type:
- Article
Golden-Free Processor Hardware Trojan Detection Using Bit Power Consistency Analysis.
- Published in:
- Journal of Electronic Testing, 2018, v. 34, n. 3, p. 305, doi. 10.1007/s10836-018-5715-z
- By:
- Publication type:
- Article
Hardware Trojan Detection Based on Logical Testing.
- Published in:
- Journal of Electronic Testing, 2017, v. 33, n. 4, p. 381, doi. 10.1007/s10836-017-5670-0
- By:
- Publication type:
- Article
Golden-Free Hardware Trojan Detection with High Sensitivity Under Process Noise.
- Published in:
- Journal of Electronic Testing, 2017, v. 33, n. 1, p. 107, doi. 10.1007/s10836-016-5632-y
- By:
- Publication type:
- Article
An Efficient Reverse Engineering Hardware Trojan Detector Using Histogram of Oriented Gradients.
- Published in:
- Journal of Electronic Testing, 2017, v. 33, n. 1, p. 93, doi. 10.1007/s10836-016-5631-z
- By:
- Publication type:
- Article
Automatic Feature Selection of Hardware Layout: A Step toward Robust Hardware Trojan Detection.
- Published in:
- Journal of Electronic Testing, 2016, v. 32, n. 3, p. 357, doi. 10.1007/s10836-016-5581-5
- By:
- Publication type:
- Article
Speeding Up Logic Locking via Fault Emulation and Dynamic Multiple Fault Injection.
- Published in:
- Journal of Electronic Testing, 2015, v. 31, n. 5/6, p. 525, doi. 10.1007/s10836-015-5544-2
- By:
- Publication type:
- Article
Wormhole Attack Detection Technique in Mobile Ad Hoc Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 2, p. 2939, doi. 10.1007/s11277-017-4643-z
- By:
- Publication type:
- Article
Secure Multi-copy Routing in Compromised Delay Tolerant Networks.
- Published in:
- Wireless Personal Communications, 2013, v. 73, n. 1, p. 149, doi. 10.1007/s11277-012-0960-4
- By:
- Publication type:
- Article
Reliability of Physical Systems: Detection of Malicious Subcircuits (Trojan Circuits) in Sequential Circuits.
- Published in:
- Russian Physics Journal, 2016, v. 59, n. 8, p. 1281, doi. 10.1007/s11182-016-0903-8
- By:
- Publication type:
- Article
A framework for hardware trojan detection based on contrastive learning.
- Published in:
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-81473-0
- By:
- Publication type:
- Article
Hardware Trojans Detection and Prevention Techniques Review.
- Published in:
- Wireless Personal Communications, 2024, v. 136, n. 2, p. 1147, doi. 10.1007/s11277-024-11334-6
- By:
- Publication type:
- Article
Guided Data Augmentation Scheme Combined with Adaptive Evolutionary Algorithm for Hardware Trojan Detection to Enhance Communication Security.
- Published in:
- International Journal on Communications Antenna & Propagation, 2022, v. 12, n. 4, p. 251, doi. 10.15866/irecap.v12i4.21578
- By:
- Publication type:
- Article
Security-aware Register Placement to Hinder Malicious Hardware Updating and Improve Trojan Detectability.
- Published in:
- ISeCure, 2015, v. 7, n. 1, p. 1
- By:
- Publication type:
- Article
ISSUES AND OPTIONS IN THE ECONOMIC REGULATION OF EUROPEAN NETWORK SECURITY.
- Published in:
- Competition & Regulation in Network Industries, 2015, v. 16, n. 1, p. 2, doi. 10.1177/178359171501600101
- By:
- Publication type:
- Article
An Innovative Honeypot Architecture for Detecting and Mitigating Hardware Trojans in IoT Devices.
- Published in:
- Internet of Things (IoT), 2024, v. 5, n. 4, p. 730, doi. 10.3390/iot5040033
- By:
- Publication type:
- Article
Blinding HT: Hiding Hardware Trojan signals traced across multiple sequential levels.
- Published in:
- IET Circuits, Devices & Systems (Wiley-Blackwell), 2022, v. 16, n. 1, p. 105, doi. 10.1049/cds2.12088
- By:
- Publication type:
- Article
A Bagging Strategy-Based Kernel Extreme Learning Machine for Complex Network Intrusion Detection.
- Published in:
- EAI Endorsed Transactions on Scalable Information Systems, 2021, v. 8, n. 33, p. 1, doi. 10.4108/eai.6-10-2021.171247
- By:
- Publication type:
- Article
Intellectual Property Design with PUF-based Hardware Security.
- Published in:
- Engineering, Technology & Applied Science Research, 2024, v. 14, n. 4, p. 15559, doi. 10.48084/etasr.7413
- By:
- Publication type:
- Article