Results 151 to 160 of about 809,010 (236)
Design and Modeling of a Terahertz Transceiver for Intra- and Inter-Chip Communications in Wireless Network-on-Chip Architectures. [PDF]
Paudel B, Li XJ, Seet BC.
europepmc +1 more source
Digital twins for building industrial metaverse. [PDF]
Lyu Z, Fridenfalk M.
europepmc +1 more source
DTR-SHIELD: Mutual Synchronization for Protecting against DoS Attacks on the SHIELD Protocol with AES-CTR Mode. [PDF]
Lee SS, Moon JS, Choi YJ, Kim D, Lee S.
europepmc +1 more source
Efficient feature ranked hybrid framework for android Iot malware detection. [PDF]
Saeed NH +3 more
europepmc +1 more source
Emerging Trends in Cybersecurity: A Holistic View on Current Threats, Assessing Solutions, and Pioneering New Frontiers. [PDF]
Zaid T, Garai S.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Scalable Detection of Hardware Trojans Using ATPG-Based Activation of Rare Events
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023Semiconductor supply chain vulnerability is a major concern in designing trustworthy systems. Malicious implants, popularly known as hardware Trojans (HTs), can get introduced at different stages in the system-on-chip (SoC) design cycle.
Aruna Jayasena, P. Mishra
semanticscholar +1 more source
Securing AI Hardware: Challenges in Detecting and Mitigating Hardware Trojans in ML Accelerators
Midwest Symposium on Circuits and Systems, 2023Artificial Intelligence (AI) has transformed multiple industries, creating specialized hardware for AI/Machine Learning (ML) workloads. These hardware accelerators have become prevalent in healthcare, scientific computing, space ex-ploration, the ...
Kevin Immanuel Gubbi +6 more
semanticscholar +1 more source

