Results 81 to 90 of about 817,598 (242)

A hardware Trojan attack protection method for CGRCA configuration bitstream

open access: yesDianzi Jishu Yingyong, 2019
A protection method based on authentication and encryption hardware security engine is proposed as the reconfigurable device configuration bitstream is vulnerable to hardware Trojan attacks.
Liu Min, Yan Yingjian, Nan Longmei
doaj   +1 more source

PlaceRaider: Virtual Theft in Physical Spaces with Smartphones [PDF]

open access: yes, 2012
As smartphones become more pervasive, they are increasingly targeted by malware. At the same time, each new generation of smartphone features increasingly powerful onboard sensor suites.
Crandall, David   +3 more
core  

Hardware Trojan Detection Using Controlled Circuit Aging

open access: yesIEEE Access, 2020
This paper reports a novel approach that uses transistor aging in an integrated circuit (IC) to detect hardware Trojans. When a transistor is aged, it results in delays along several paths of the IC.
Virinchi Roy Surabhi   +6 more
doaj   +1 more source

Design and analysis of hardware Trojans in approximate circuits

open access: yesElectronics Letters, 2022
Approximate computing can accept errors in computation systems to achieve better utilisation of hardware resources. Approximate computing has been successfully developed in integrated circuits, such as approximate arithemtic circuits and approximate ...
Yuqin Dou   +4 more
doaj   +1 more source

Robust Hardware Trojan Detection Method by Unsupervised Learning of Electromagnetic Signals

open access: yesIEEE Transactions on Very Large Scale Integration (VLSI) Systems
This article explores the threat posed by Hardware Trojans (HTs), malicious circuits clandestinely embedded in hardware akin to software backdoors. Activation by attackers renders these Trojans capable of inducing malfunctions or leaking confidential ...
Daehyeon Lee   +4 more
semanticscholar   +1 more source

Deep Space Network Radio Science and Ground‐Based Planetary Radar in the Next Decade

open access: yesRadio Science, Volume 60, Issue 7, July 2025.
Abstract The Deep Space Network (DSN) has been a core operational element of NASA's crewed and robotic exploration of the Solar System since the early 1960s. The primary role of the DSN has been to acquire telemetry and navigation data, but over the years, its radiometric and radar capabilities have expanded to form a system for obtaining unique ...
R. S. Park   +13 more
wiley   +1 more source

Soil to Sail - Asteroid Landers on Near-Term Sailcraft as an Evolution of the GOSSAMER Small Spacecraft Solar Sail Concept for In-Situ Characterization [PDF]

open access: yes, 2017
Any effort which intends to physically interact with specific asteroids requires understanding at least of the composition and multi-scale structure of the surface layers, sometimes also of the interior.
Boden, Ralf   +12 more
core  

Greening the Gulf? Renewables, Fossil Capitalism and the ‘East–East’ Axis of World Energy

open access: yesDevelopment and Change, Volume 56, Issue 4-5, Page 957-981, July-September 2025.
ABSTRACT This article examines the place of the Gulf Cooperation Council states in the global energy transition, with a focus on the recent and rapid expansion of renewable energy in the region. It argues that much like at the global scale, the energy transition in the Gulf is an additive process, one that superimposes renewable energy on growing ...
Adam Hanieh
wiley   +1 more source

Assessment of Practical Satellite Quantum Key Distribution Architectures for Current and Near‐Future Missions

open access: yesInternational Journal of Satellite Communications and Networking, Volume 43, Issue 3, Page 164-192, May/June 2025.
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci   +7 more
wiley   +1 more source

PRISTINE: An Emulation Platform for PCB-Level Hardware Trojans

open access: yesIEEE Access
Printed circuit Boards (PCBs) are becoming increasingly vulnerable to malicious design alteration, also known as Trojan attacks, due to a distributed business model that often involves various untrusted parties.
Junjun Huan   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy