The Cybersecurity and the Care Robots: A Viewpoint on the Open Problems and the Perspectives. [PDF]
Giansanti D, Gulino RA.
europepmc +1 more source
Applicability and Design Considerations of Chaotic and Quantum Entropy Sources for Random Number Generation in IoT Devices. [PDF]
Marszalek W +3 more
europepmc +1 more source
A distributed framework for zero-day malware detection using federated ensemble models. [PDF]
Ishfaq H, Shah JH, Saleem R, Afzal M.
europepmc +1 more source
Designing Trojan Detectors in Neural Networks Using Interactive Simulations. [PDF]
Bajcsy P, Schaub NJ, Majurski M.
europepmc +1 more source
Hardware reverse engineering and its implications for hardware protections and hardware trojans
Mikrochips bilden das Rückgrat der digitalen Gesellschaft, doch globale, komplexe Lieferketten erhöhen das Risiko böswilliger Hardware-Manipulationen. Hardware-Reverse-Engineering (HRE) kann Angriffe wie Hardware-Trojaner aufdecken, ermöglicht jedoch zugleich IP-Diebstahl und Angriffsvorbereitungen.
openaire +2 more sources
High-fidelity chip delayering using green (515 nm) femtosecond lasers. [PDF]
Anaei MTM +13 more
europepmc +1 more source
Security of ADS-B and Remote ID Systems: Cyberattacks, Detection Techniques, and Countermeasures. [PDF]
Shi Q, Caleb TD, Shao S, Kaabouch N.
europepmc +1 more source
Systematic Evaluation of Machine Learning and Deep Learning Models for IoT Malware Detection Across Ransomware, Rootkit, Spyware, Trojan, Botnet, Worm, Virus, and Keylogger. [PDF]
Maghanaki M +3 more
europepmc +1 more source
Self-Rectifying Memristors for Beyond-CMOS Computing: Mechanisms, Materials, and Integration Prospects. [PDF]
Zhang G +10 more
europepmc +1 more source

