Results 141 to 150 of about 809,010 (236)

A lightweight model design approach for few-shot malicious traffic classification. [PDF]

open access: yesSci Rep
Wang R   +6 more
europepmc   +1 more source

Tackling Hardware Trojans via Hardware-based Methodologies

open access: yes
Hardware Trojans (HTs) represent significant challenges to the security and reliability of modern microprocessorbased systems. This manuscript introduces two complementary approaches to enhance hardware security. First, programmable Hardware Security Modules are proposed to detect Hardware Trojan Horses by monitoring instruction-fetch activities ...
openaire   +1 more source

A hierarchical deep learning framework with doubly regularized loss for robust malware detection and family categorization. [PDF]

open access: yesSci Rep
Abed Alsaedi S   +6 more
europepmc   +1 more source

Tackling Hardware Trojan Horses via Hardware-based Methodologies

open access: yes
Hardware-based approaches to detect bit-flips, unauthorized program runs, and tampering.
openaire   +1 more source

BioTrojans: viscoelastic microvalve-based attacks in flow-based microfluidic biochips and their countermeasures. [PDF]

open access: yesSci Rep
Baban NS   +8 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy