Results 91 to 100 of about 809,010 (236)

Spartan Daily September 9, 2009 [PDF]

open access: yes, 2009
Volume 133, Issue 7https://scholarworks.sjsu.edu/spartandaily/1276/thumbnail ...
San Jose State University, School of Journalism and Mass Communications
core   +2 more sources

Shrinking the Skin: Motion Results in Compressive Mislocalization of Stimuli Applied 10 s Post‐Motion

open access: yesEuropean Journal of Neuroscience, Volume 61, Issue 7, April 2025.
Moving objects touch successive skin locations, providing spatial information. When a brush sweeps along the skin but rapidly accelerates to skip a patch in the middle, it creates deceptive temporal continuity between skin regions before and after the gap. This acceleration‐induced continuity causes spatial distortion: the untouched region perceptually
Tatjana Seizova‐Cajic   +2 more
wiley   +1 more source

Hardware Trojan Detection Using Controlled Circuit Aging

open access: yesIEEE Access, 2020
This paper reports a novel approach that uses transistor aging in an integrated circuit (IC) to detect hardware Trojans. When a transistor is aged, it results in delays along several paths of the IC.
Virinchi Roy Surabhi   +6 more
doaj   +1 more source

IoT and Man‐in‐the‐Middle Attacks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni   +2 more
wiley   +1 more source

Hardware Trojan Detection in Open-Source Hardware Designs Using Machine Learning

open access: yesIEEE Access
The globalization of the hardware supply chain reduces costs but increases security challenges with the potential insertion of hardware trojans by third parties.
Victor Takashi Hayashi   +1 more
doaj   +1 more source

Gate-Level Hardware Trojan Detection Method for Graph Neural Networks Based on Controllability Metrics [PDF]

open access: yesJisuanji gongcheng
With the continuous increase in globalization, third-party Intellectual Property (IP) core applications have become increasingly widespread. The gradual maturity of hardware Trojan attack technology enables the implantation of hardware Trojan in the chip
Yang ZHANG, Chang LIU, Shaoqing LI
doaj   +1 more source

Hardware Trojans Inspired IP Watermarks

open access: yesIEEE Design & Test, 2019
Editor’s note: Hardware watermarking (HW) is supposed to protect the authenticity of HW intellectual properties (IPs) but face the dual challenge of high overhead and ease of removal. HW Trojans are designed to overcome those same challenges for a very different purpose.
Mohammed Shayan   +2 more
openaire   +1 more source

PRISTINE: An Emulation Platform for PCB-Level Hardware Trojans

open access: yesIEEE Access
Printed circuit Boards (PCBs) are becoming increasingly vulnerable to malicious design alteration, also known as Trojan attacks, due to a distributed business model that often involves various untrusted parties.
Junjun Huan   +3 more
doaj   +1 more source

Hardware Trojans detection based on projection pursuit

open access: yesTongxin xuebao, 2013
A novel hardware Trojans detection technique using the side channel signals of chips was proposed.Based on the projection pursuit with absolute information divergence index,this technique could find out the data structure enables reflect high dimension ...
Peng ZHANG, Xin-cheng WANG, Qing ZHOU
doaj   +2 more sources

A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection. [PDF]

open access: yesSensors (Basel), 2023
Dong C   +6 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy