Results 91 to 100 of about 809,010 (236)
Spartan Daily September 9, 2009 [PDF]
Volume 133, Issue 7https://scholarworks.sjsu.edu/spartandaily/1276/thumbnail ...
San Jose State University, School of Journalism and Mass Communications
core +2 more sources
Moving objects touch successive skin locations, providing spatial information. When a brush sweeps along the skin but rapidly accelerates to skip a patch in the middle, it creates deceptive temporal continuity between skin regions before and after the gap. This acceleration‐induced continuity causes spatial distortion: the untouched region perceptually
Tatjana Seizova‐Cajic +2 more
wiley +1 more source
Hardware Trojan Detection Using Controlled Circuit Aging
This paper reports a novel approach that uses transistor aging in an integrated circuit (IC) to detect hardware Trojans. When a transistor is aged, it results in delays along several paths of the IC.
Virinchi Roy Surabhi +6 more
doaj +1 more source
IoT and Man‐in‐the‐Middle Attacks
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni +2 more
wiley +1 more source
Hardware Trojan Detection in Open-Source Hardware Designs Using Machine Learning
The globalization of the hardware supply chain reduces costs but increases security challenges with the potential insertion of hardware trojans by third parties.
Victor Takashi Hayashi +1 more
doaj +1 more source
Gate-Level Hardware Trojan Detection Method for Graph Neural Networks Based on Controllability Metrics [PDF]
With the continuous increase in globalization, third-party Intellectual Property (IP) core applications have become increasingly widespread. The gradual maturity of hardware Trojan attack technology enables the implantation of hardware Trojan in the chip
Yang ZHANG, Chang LIU, Shaoqing LI
doaj +1 more source
Hardware Trojans Inspired IP Watermarks
Editor’s note: Hardware watermarking (HW) is supposed to protect the authenticity of HW intellectual properties (IPs) but face the dual challenge of high overhead and ease of removal. HW Trojans are designed to overcome those same challenges for a very different purpose.
Mohammed Shayan +2 more
openaire +1 more source
PRISTINE: An Emulation Platform for PCB-Level Hardware Trojans
Printed circuit Boards (PCBs) are becoming increasingly vulnerable to malicious design alteration, also known as Trojan attacks, due to a distributed business model that often involves various untrusted parties.
Junjun Huan +3 more
doaj +1 more source
Hardware Trojans detection based on projection pursuit
A novel hardware Trojans detection technique using the side channel signals of chips was proposed.Based on the projection pursuit with absolute information divergence index,this technique could find out the data structure enables reflect high dimension ...
Peng ZHANG, Xin-cheng WANG, Qing ZHOU
doaj +2 more sources
A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection. [PDF]
Dong C +6 more
europepmc +1 more source

