Results 71 to 80 of about 809,010 (236)

Towards Trust Hardware Deployment of Edge Computing: Mitigation of Hardware Trojans Based on Evolvable Hardware

open access: yesApplied Sciences, 2022
Hardware Trojans (HTs) are malicious hardware components designed to leak confidential information or cause the chip/circuit on which they are integrated to malfunction during operation.
Zeyu Li   +4 more
doaj   +1 more source

Creating a Backscattering Side Channel to Enable Detection of Dormant Hardware Trojans

open access: yesIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2019
This paper describes a new physical side channel, i.e., the backscattering side channel, created by transmitting a signal toward the integrated circuits (ICs), where the internal impedance changes caused by on-chip switching activity modulate the signal ...
Luong N. Nguyen   +3 more
semanticscholar   +1 more source

Amplitude-Modulating Analog/RF Hardware Trojans in Wireless Networks: Risks and Remedies

open access: yesIEEE Transactions on Information Forensics and Security, 2020
We investigate the risk posed by amplitude-modulating analog/RF hardware Trojans in wireless networks and propose a defense mechanism to mitigate the threat.
K. S. Subramani   +4 more
semanticscholar   +1 more source

Quantum Key Distribution Networks Design: Overview and Challenges

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
This paper explores the potential of using established QKD network design techniques in the context of quantum key distribution, which is based on the principles of quantum mechanics. ABSTRACT Quantum cryptography has increasingly attracted interest from both industry and academia for its potential in real‐world applications.
Pankaj Kumar   +2 more
wiley   +1 more source

Device‐Independent Quantum Key Distribution: Protocols, Quantum Games and Security

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
Device‐independent quantum key distribution (DIQKD) removes the need to trust internal device behaviour by certifying security through Bell‐inequality violations, thereby closing practical loopholes in conventional QKD. This paper systematically reviews DIQKD foundations (Bell tests and security definitions), protocol frameworks (CHSH‐based and ...
Syed M. Arslan   +3 more
wiley   +1 more source

DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Reverse engineering of integrated circuits, i.e., understanding the internals of Integrated Circuits (ICs), is required for many benign and malicious applications.
Nils Albartus   +4 more
doaj   +1 more source

Hardware Trojans in Reconfigurable Computing [PDF]

open access: yes2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC), 2021
The design flow for field-programmable gate arrays (FPGAs), besides conventional methods of inserting Trojans into a design by a malicious entity, can also be surreptitiously compromised to assist an attacker to perform a successful malfunctioning or information leakage attack.
openaire   +1 more source

Balancing Innovation With Cybersecurity: Exploring the Role of Emerging Technologies in Digital Transformation for Socioeconomic Development in Nigeria

open access: yesHuman Behavior and Emerging Technologies, Volume 2026, Issue 1, 2026.
Rapid digital adoption in Nigeria has been accompanied by rising cybercrime; a 2021 Sophos survey found 71% of Nigerian organizations experienced cyberattacks, 44% of which paid ransoms averaging USD 3.43 million. The integration of emerging technologies (artificial intelligence, blockchain, Internet of Things, and 5G) offers transformative ...
Goddy Uwa Osimen   +5 more
wiley   +1 more source

A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator

open access: yesCryptography
With the boom in artificial intelligence (AI), numerous reconfigurable convolution neural network (CNN) accelerators have emerged within both industry and academia, aiming to enhance AI computing capabilities.
Zichu Liu   +3 more
doaj   +1 more source

Multi‐Omics‐Driven Adaptive Management of Biological Invasions: Toward a Proactive, Predictive, and Integrative Framework

open access: yesBiological Diversity, Volume 2, Issue 4, Page 163-192, December 2025.
A proactive, predictive, and integrative framework that integrates multi‐omics innovations with ecological modeling and big data analytics to guide adaptive interventions and governance in invasive species management. By integrating multi‐omics insights with advanced ecological modeling, remote sensing, artificial intelligence, and cross‐disciplinary ...
Aibin Zhan
wiley   +1 more source

Home - About - Disclaimer - Privacy