Applicability and Design Considerations of Chaotic and Quantum Entropy Sources for Random Number Generation in IoT Devices. [PDF]
Marszalek W +3 more
europepmc +1 more source
Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs. [PDF]
Ali L, Farshad.
europepmc +1 more source
A distributed framework for zero-day malware detection using federated ensemble models. [PDF]
Ishfaq H, Shah JH, Saleem R, Afzal M.
europepmc +1 more source
The Cybersecurity and the Care Robots: A Viewpoint on the Open Problems and the Perspectives. [PDF]
Giansanti D, Gulino RA.
europepmc +1 more source
High-fidelity chip delayering using green (515 nm) femtosecond lasers. [PDF]
Anaei MTM +13 more
europepmc +1 more source
Designing Trojan Detectors in Neural Networks Using Interactive Simulations. [PDF]
Bajcsy P, Schaub NJ, Majurski M.
europepmc +1 more source
Security of ADS-B and Remote ID Systems: Cyberattacks, Detection Techniques, and Countermeasures. [PDF]
Shi Q, Caleb TD, Shao S, Kaabouch N.
europepmc +1 more source
Systematic Evaluation of Machine Learning and Deep Learning Models for IoT Malware Detection Across Ransomware, Rootkit, Spyware, Trojan, Botnet, Worm, Virus, and Keylogger. [PDF]
Maghanaki M +3 more
europepmc +1 more source

