Results 71 to 80 of about 9,568 (196)

An Unsupervised Detection Approach for Hardware Trojans

open access: yesIEEE Access, 2020
With the booming development of the cyber-physical system, human society is much more dependent on information technology. Unfortunately, like software, hardware is not trusted at all, due to so many third parties involved in the separated integrated ...
Chen Dong   +5 more
doaj   +1 more source

Side-channel based intrusion detection for industrial control systems

open access: yes, 2017
Industrial Control Systems are under increased scrutiny. Their security is historically sub-par, and although measures are being taken by the manufacturers to remedy this, the large installed base of legacy systems cannot easily be updated with state-of ...
A Beckers   +13 more
core   +1 more source

Hardware property checker for run-time Hardware Trojan detection [PDF]

open access: yes2015 European Conference on Circuit Theory and Design (ECCTD), 2015
Nowadays, Hardware Trojans (HTs) become a real threat because of IC design and fabrication outsourcing trend. In the state of the art, many efforts were devoted to counter this threat, especially at netlist level. However, some clever HTs are actually a combination between a hardware and a software vulnerability, which, together, allow an exploitation.
Xuan Thuy Ngo   +4 more
openaire   +1 more source

Greening the Gulf? Renewables, Fossil Capitalism and the ‘East–East’ Axis of World Energy

open access: yesDevelopment and Change, Volume 56, Issue 4-5, Page 957-981, July-September 2025.
ABSTRACT This article examines the place of the Gulf Cooperation Council states in the global energy transition, with a focus on the recent and rapid expansion of renewable energy in the region. It argues that much like at the global scale, the energy transition in the Gulf is an additive process, one that superimposes renewable energy on growing ...
Adam Hanieh
wiley   +1 more source

Dataset for hardware Trojan detection

open access: yes, 2022
Nowadays, cloud services rely extensively on the use of virtual machines to enforce security by isolation. However, hardware trojan attacks break this assumption. Within these attacks, cache side-channel attacks such as Spectre and Meltdown are the focus of this work.
openaire   +1 more source

Assessment of Practical Satellite Quantum Key Distribution Architectures for Current and Near‐Future Missions

open access: yesInternational Journal of Satellite Communications and Networking, Volume 43, Issue 3, Page 164-192, May/June 2025.
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci   +7 more
wiley   +1 more source

Creating a blockchain platform: An empirical analysis in the Italian banking sector

open access: yesCreativity and Innovation Management, Volume 34, Issue 2, Page 393-413, June 2025.
Digital platforms continue to be a focal point for scholars and practitioners, with growing attention being paid to the dynamics that shape platform leadership. Against this backdrop, blockchain technology emerges for its disruptive potential, offering attractive opportunities for collaboration through shared infrastructure, and arguably remodelling ...
Giacomo Vella, Luca Gastaldi
wiley   +1 more source

Shrinking the Skin: Motion Results in Compressive Mislocalization of Stimuli Applied 10 s Post‐Motion

open access: yesEuropean Journal of Neuroscience, Volume 61, Issue 7, April 2025.
Moving objects touch successive skin locations, providing spatial information. When a brush sweeps along the skin but rapidly accelerates to skip a patch in the middle, it creates deceptive temporal continuity between skin regions before and after the gap. This acceleration‐induced continuity causes spatial distortion: the untouched region perceptually
Tatjana Seizova‐Cajic   +2 more
wiley   +1 more source

IoT and Man‐in‐the‐Middle Attacks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni   +2 more
wiley   +1 more source

Golden Chip-Free Hardware Trojan Detection Using Attention-Based Non-Local Convolution With Simple Recurrent Unit

open access: yesIEEE Access
The globalization of the semiconductor industry introduces vulnerabilities like hardware Trojans that compromise hardware security and pose serious risks to critical applications such as military and medical systems. Traditional hardware Trojan detection
Rama Devi Maddineni, Deepak Ch
doaj   +1 more source

Home - About - Disclaimer - Privacy