Results 61 to 70 of about 8,384 (195)
Hardware Trojans (HTs) are malicious hardware components designed to leak confidential information or cause the chip/circuit on which they are integrated to malfunction during operation.
Zeyu Li +4 more
doaj +1 more source
A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL
Split manufacturing was introduced as an effective countermeasure against hardware-level threats such as IP piracy, overbuilding, and insertion of hardware Trojans.
Knechtel, Johann +3 more
core +1 more source
Security Challenges and Solutions in Self‐Driving Vehicles: A Comprehensive Review
This article presents a comprehensive review of cybersecurity challenges and solutions in self‐driving vehicles, focusing on threats across vehicular communication, sensors, artificial intelligence (AI) systems, and data privacy. It categorises attacks based on autonomous vehicle architecture layers and highlights advanced countermeasures such as AI ...
Yaw Opoku Mensah Sekyere +2 more
wiley +1 more source
Cybersecurity Driven Quantum Digital Twin for Proactive Threat Reversal in Open RAN
This paper presents a novel cybersecurity‐driven quantum digital twin (CQDT) architecture for proactive defence in 6G Open RAN. By integrating quantum observables and reinforcement learning, the framework maintains high fidelity and suppresses entropy under adversarial CPTP noise. CQDT achieves real‐time adaptation with sub‐20 ms latency, meeting URLLC
Yassir Al‐Karawi +2 more
wiley +1 more source
A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator
With the boom in artificial intelligence (AI), numerous reconfigurable convolution neural network (CNN) accelerators have emerged within both industry and academia, aiming to enhance AI computing capabilities.
Zichu Liu +3 more
doaj +1 more source
Spartan Daily September 9, 2009 [PDF]
Volume 133, Issue 7https://scholarworks.sjsu.edu/spartandaily/1276/thumbnail ...
San Jose State University, School of Journalism and Mass Communications
core +2 more sources
Resisting Quantum Key Distribution Attacks Using Quantum Machine Learning
Quantum key distribution (QKD) promises secure communication but remains vulnerable to advanced quantum attacks. We propose a hybrid quantum long short‐term memory (QLSTM) model that combines quantum‐enhanced learning with classical deep learning to detect attacks such as photon‐number splitting, Trojan‐Horse and detector blinding.
Ali Al‐Kuwari +4 more
wiley +1 more source
Quantum Key Distribution Networks Design: Overview and Challenges
This paper explores the potential of using established QKD network design techniques in the context of quantum key distribution, which is based on the principles of quantum mechanics. ABSTRACT Quantum cryptography has increasingly attracted interest from both industry and academia for its potential in real‐world applications.
Pankaj Kumar +2 more
wiley +1 more source
Device‐Independent Quantum Key Distribution: Protocols, Quantum Games and Security
Device‐independent quantum key distribution (DIQKD) removes the need to trust internal device behaviour by certifying security through Bell‐inequality violations, thereby closing practical loopholes in conventional QKD. This paper systematically reviews DIQKD foundations (Bell tests and security definitions), protocol frameworks (CHSH‐based and ...
Syed M. Arslan +3 more
wiley +1 more source
AI‐Powered Defense: Leveraging Deep Learning for Effective Malware Detection
Traditional malware detection techniques frequently fail to detect and stop malicious activity in an era where cyber threats are becoming more complex. Any software that enters a computer system without the administrator’s consent is considered malicious software.
Nancy Awadallah Awad +1 more
wiley +1 more source

