Results 91 to 100 of about 9,623 (197)

Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAs

open access: yesCryptography
Field-programmable gate arrays (FPGAs) offer the inherent ability to reconfigure at runtime, making them ideal for applications such as data centers, cloud computing, and edge computing. This reconfiguration, often achieved through remote access, enables
Jaya Dofe   +3 more
doaj   +1 more source

87th Annual Meeting of the Meteoritical Society 2025: Abstracts

open access: yes
Meteoritics &Planetary Science, Volume 60, Issue S1, Page 30-350, August 2025.
wiley   +1 more source

GNN-MFF: A Multi-View Graph-Based Model for RTL Hardware Trojan Detection

open access: yesApplied Sciences
The globalization of hardware design flows has increased the risk of Hardware Trojan (HT) insertion during the design phase. Graph-based learning methods have shown promise for HT detection at the Register Transfer Level (RTL).
Senjie Zhang   +4 more
doaj   +1 more source

Hardware Trojan Mitigation Technique in Network-on-Chip (NoC). [PDF]

open access: yesMicromachines (Basel), 2023
Hussain M   +6 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy