Results 61 to 70 of about 9,568 (196)

AVATAR: NN-Assisted Variation Aware Timing Analysis and Reporting for Hardware Trojan Detection

open access: yesIEEE Access, 2021
This paper presents AVATAR, a learning-assisted Trojan testing flow to detect hardware Trojans placed into fabricated ICs at an untrusted foundry, without needing a Golden IC.
Ashkan Vakil   +4 more
doaj   +1 more source

Using outliers to detect stealthy hardware trojan triggering? [PDF]

open access: yes2016 1st IEEE International Verification and Security Workshop (IVSW), 2016
Hardware Trojans (HTs) are malicious alterations to a circuit introduced at design or manufacturing phases by an adversary. Due to their diversity, detecting and/or locating them are challenging tasks. Among the different kinds of detection methods, methods based on logic testing aim to reveal the presence of HTs thanks to their logical activation and ...
Ba, Papa-Sidy   +4 more
openaire   +2 more sources

Balancing Innovation With Cybersecurity: Exploring the Role of Emerging Technologies in Digital Transformation for Socioeconomic Development in Nigeria

open access: yesHuman Behavior and Emerging Technologies, Volume 2026, Issue 1, 2026.
Rapid digital adoption in Nigeria has been accompanied by rising cybercrime; a 2021 Sophos survey found 71% of Nigerian organizations experienced cyberattacks, 44% of which paid ransoms averaging USD 3.43 million. The integration of emerging technologies (artificial intelligence, blockchain, Internet of Things, and 5G) offers transformative ...
Goddy Uwa Osimen   +5 more
wiley   +1 more source

Multi‐Omics‐Driven Adaptive Management of Biological Invasions: Toward a Proactive, Predictive, and Integrative Framework

open access: yesBiological Diversity, Volume 2, Issue 4, Page 163-192, December 2025.
A proactive, predictive, and integrative framework that integrates multi‐omics innovations with ecological modeling and big data analytics to guide adaptive interventions and governance in invasive species management. By integrating multi‐omics insights with advanced ecological modeling, remote sensing, artificial intelligence, and cross‐disciplinary ...
Aibin Zhan
wiley   +1 more source

Triggered Hardware Trojan Detection in IP Cores for Ensuring Safety in Cyber Physical Systems

open access: yesChips
Cyber physical systems (CPSs) increasingly depend on complex hardware IP cores to perform critical functions. However, triggered hardware Trojans’ stealthy, malicious modifications activated under rare conditions pose significant threats to the safety ...
Mahfuzur Rahman Talukder   +3 more
doaj   +1 more source

Hardware Security in the Connected World

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 3, September 2025.
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee   +4 more
wiley   +1 more source

PlaceRaider: Virtual Theft in Physical Spaces with Smartphones [PDF]

open access: yes, 2012
As smartphones become more pervasive, they are increasingly targeted by malware. At the same time, each new generation of smartphone features increasingly powerful onboard sensor suites.
Crandall, David   +3 more
core  

Creation of backdoors in quantum communications via laser damage

open access: yes, 2016
Practical quantum communication (QC) protocols are assumed to be secure provided implemented devices are properly characterized and all known side channels are closed. We show that this is not always true.
Bourgoin, Jean-Philippe   +9 more
core   +1 more source

Hardware Trojans detection based on projection pursuit

open access: yesTongxin xuebao, 2013
A novel hardware Trojans detection technique using the side channel signals of chips was proposed.Based on the projection pursuit with absolute information divergence index,this technique could find out the data structure enables reflect high dimension ...
Peng ZHANG, Xin-cheng WANG, Qing ZHOU
doaj   +2 more sources

Deep Space Network Radio Science and Ground‐Based Planetary Radar in the Next Decade

open access: yesRadio Science, Volume 60, Issue 7, July 2025.
Abstract The Deep Space Network (DSN) has been a core operational element of NASA's crewed and robotic exploration of the Solar System since the early 1960s. The primary role of the DSN has been to acquire telemetry and navigation data, but over the years, its radiometric and radar capabilities have expanded to form a system for obtaining unique ...
R. S. Park   +13 more
wiley   +1 more source

Home - About - Disclaimer - Privacy