Results 51 to 60 of about 809,010 (236)

A secure and trusted boot process for Avionics Wireless Networks [PDF]

open access: yes, 2016
Integrated Modular Avionics (IMA) in existing deployments is a collection of inter-connected avionics equipment supported by wired technology, with stringent reliability and safety requirements.
Akram, Raja, Markantonakis, Konstantinos
core   +1 more source

Hardware Trojans detection through automatic properties extraction and formal verification

open access: yesXibei Gongye Daxue Xuebao
To address the difficulties in obtaining golden reference models and the low accuracy when conducting pre-silicon hardware Trojans detection on a large-scale integrated circuit design, a formal detection method to quickly and accurately locate hardware ...
DAI Xiaojie   +3 more
doaj   +1 more source

Hardware Trojan Identification and Detection

open access: yesInternational Journal on Cryptography and Information Security, 2017
ABSTRACT The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques.
Moein, Samer   +3 more
openaire   +1 more source

Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation Techniques

open access: yesEmitter: International Journal of Engineering Technology, 2022
Today's Multiprocessor System-on-Chip (MPSoC) contains many cores and integrated circuits. Due to the current requirements of communication, we make use of Network-on-Chip (NoC) to obtain high throughput and low latency.
Thejaswini P   +5 more
doaj   +1 more source

Rethinking Split Manufacturing: An Information-Theoretic Approach with Secure Layout Techniques

open access: yes, 2017
Split manufacturing is a promising technique to defend against fab-based malicious activities such as IP piracy, overbuilding, and insertion of hardware Trojans. However, a network flow-based proximity attack, proposed by Wang et al.
Ashraf, Mohammed   +5 more
core   +1 more source

The Influence of Big Data‐Driven Educational Technologies on College Teaching Development

open access: yesEngineering Reports, Volume 8, Issue 2, February 2026.
Exploring the impact of big data on college instructors: enhancing teaching, fostering professional growth, and addressing challenges in data adoption and privacy. ABSTRACT The rapid development of big data and mobile Internet technologies has significantly influenced the instructional growth of college instructors. This study investigated how big data
Ling Yu, Wenye Li, Ying Luo
wiley   +1 more source

Trojans in Early Design Steps—An Emerging Threat [PDF]

open access: yes, 2016
Hardware Trojans inserted by malicious foundries during integrated circuit manufacturing have received substantial attention in recent years. In this paper, we focus on a different type of hardware Trojan threats: attacks in the early steps of design
Becker, Georg T.   +2 more
core  

Neural Trojans

open access: yes, 2017
While neural networks demonstrate stronger capabilities in pattern recognition nowadays, they are also becoming larger and deeper. As a result, the effort needed to train a network also increases dramatically. In many cases, it is more practical to use a
Liu, Yuntao   +2 more
core   +1 more source

Covert Communication Channels Based On Hardware Trojans: Open-Source Dataset and AI-Based Detection

open access: yesIEEE International Symposium on Hardware Oriented Security and Trust
The threat of Hardware Trojan-based Covert Channels (HT-CCs) presents a significant challenge to the security of wireless communications. In this work, we generate in hardware and make open-source a dataset for various HT-CC scenarios.
Alán Rodrigo Díaz Rizo   +3 more
semanticscholar   +1 more source

Artificial intelligence‐powered microscopy: Transforming the landscape of parasitology

open access: yesJournal of Microscopy, Volume 301, Issue 2, Page 280-329, February 2026.
Abstract Microscopy and image analysis play a vital role in parasitology research; they are critical for identifying parasitic organisms and elucidating their complex life cycles. Despite major advancements in imaging and analysis, several challenges remain. These include the integration of interdisciplinary data; information derived from various model
Mariana De Niz   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy