Results 31 to 40 of about 9,568 (196)
A Survey on the Design, Detection, and Prevention of Pre-Silicon Hardware Trojans
The complexity of the semiconductor design lifecycle and globalized manufacturing process creates concern over the threat of deliberate malicious alterations, or hardware Trojans, being inserted into microelectronic designs.
Jonathan Cruz, Jason Hamlet
doaj +1 more source
Witnessing effective entanglement over a 2km fiber channel [PDF]
We present a fiber-based continuous-variable quantum key distribution system. In the scheme, a quantum signal of two non-orthogonal weak optical coherent states is sent through a fiber-based quantum channel. The receiver simultaneously measures conjugate
Bennett +42 more
core +1 more source
Homomorphic Data Isolation for Hardware Trojan Protection
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr +4 more
core +1 more source
Hardware Trojan Detection Using Controlled Circuit Aging
This paper reports a novel approach that uses transistor aging in an integrated circuit (IC) to detect hardware Trojans. When a transistor is aged, it results in delays along several paths of the IC.
Virinchi Roy Surabhi +6 more
doaj +1 more source
The Influence of Big Data‐Driven Educational Technologies on College Teaching Development
Exploring the impact of big data on college instructors: enhancing teaching, fostering professional growth, and addressing challenges in data adoption and privacy. ABSTRACT The rapid development of big data and mobile Internet technologies has significantly influenced the instructional growth of college instructors. This study investigated how big data
Ling Yu, Wenye Li, Ying Luo
wiley +1 more source
Reusing Logic Masking to Facilitate Hardware Trojan Detection [PDF]
Hardware Trojan (HT) and Integrated Circuit (IC)/ Intellectual Property (IP) piracy are important threats which may happen in untrusted fabrication foundries.
Beroulle, Vincent +2 more
core
Artificial intelligence‐powered microscopy: Transforming the landscape of parasitology
Abstract Microscopy and image analysis play a vital role in parasitology research; they are critical for identifying parasitic organisms and elucidating their complex life cycles. Despite major advancements in imaging and analysis, several challenges remain. These include the integration of interdisciplinary data; information derived from various model
Mariana De Niz +4 more
wiley +1 more source
Malware detection techniques for mobile devices
Mobile devices have become very popular nowadays, due to its portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications
Amro, Bela
core +1 more source
Thermal Scans for Detecting Hardware Trojans [PDF]
It is well known that companies have been outsourcing their IC production to countries where it is simply not possible to guarantee the integrity of final products. This relocation trend creates a need for methodologies and embedded design solutions to identify counterfeits but also to detect potential Hardware Trojans (HT).
Cozzi, Maxime +2 more
openaire +2 more sources
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley +1 more source

