Results 111 to 120 of about 32,756 (234)

Hardware Trojans detection based on projection pursuit

open access: yesTongxin xuebao, 2013
A novel hardware Trojans detection technique using the side channel signals of chips was proposed.Based on the projection pursuit with absolute information divergence index,this technique could find out the data structure enables reflect high dimension ...
Peng ZHANG, Xin-cheng WANG, Qing ZHOU
doaj   +2 more sources

Periodontal Medicine Rewired: Mechanisms Linking Periodontitis to Systemic Diseases

open access: yesJournal of Periodontal Research, EarlyView.
This review reorganizes decades of research in periodontal medicine into a multi‐dimensional framework, illustrating how periodontitis influences systemic health through at least seven interconnected mechanisms. ABSTRACT Periodontitis is now recognized not merely as a localized oral condition but as a systemic disease linked to over 70 communicable and
Mario Romandini   +3 more
wiley   +1 more source

TROJAN-GUARD: Hardware Trojans Detection Using GNN in RTL Designs

open access: yes2025 International Joint Conference on Neural Networks (IJCNN)
Chip manufacturing is a complex process, and to achieve a faster time to market, an increasing number of untrusted third-party tools and designs from around the world are being utilized. The use of these untrusted third party intellectual properties (IPs) and tools increases the risk of adversaries inserting hardware trojans (HTs). The covert nature of
Kiran Thorat   +3 more
openaire   +2 more sources

Revising Structuralism in Times of Crisis: Lance Taylor and the Neo‐Structuralist Synthesis in the 1980s

open access: yesMetroeconomica, EarlyView.
ABSTRACT This article places the work of Lance Taylor in the broader context of efforts in the 1980s to renew the structuralist tradition of development economics, into what was then newly coined as neo‐structuralism. These efforts centred around three groups: CEPAL, Lance Taylor and his team at MIT, and a group of economists based at the Institute of ...
Andrew M. Fischer
wiley   +1 more source

Golden Chip-Free Hardware Trojan Detection Using Attention-Based Non-Local Convolution With Simple Recurrent Unit

open access: yesIEEE Access
The globalization of the semiconductor industry introduces vulnerabilities like hardware Trojans that compromise hardware security and pose serious risks to critical applications such as military and medical systems. Traditional hardware Trojan detection
Rama Devi Maddineni, Deepak Ch
doaj   +1 more source

City of God and the Duty of Just Memory

open access: yesModern Theology, EarlyView.
Abstract In a recent essay, Richard Miller claims that Augustine presumes a duty to remember justly in his City of God. However, Miller's brief reference to a presumed duty of “just memory” does not fully explain how Augustine conceptualizes this duty or how it relates to his theological concerns.
Zachary J. Taylor
wiley   +1 more source

Histopathological investigation of wound healing activities of Lucilia sericata Larva and Achillea sintenisii extract combinations in diabetic rat wound model

open access: yesMedical and Veterinary Entomology, EarlyView.
Lucilia sericata larvae secrete bioactive compounds that promote wound debridement and antimicrobial defence in chronic tissue injuries. Achillea sintenisii extract offers phytotherapeutic support, enhancing healing through anti‐inflammatory and regenerative properties. Diabetic Wistar rats were treated topically with Furacin®, larval secretions, plant
Nevra Polat   +2 more
wiley   +1 more source

A neural network framework based on ConvNeXt for side-channel hardware Trojan detection

open access: yesETRI Journal
Researchers in the field of hardware security have been dedicated to the study of hardware Trojan detection. Among the various approaches, side-channel detection methods are widely used because of their high detection accuracy and fewer constraints ...
Yuchan Gao   +4 more
doaj   +1 more source

Defense of hidden backdoor technology for Web

open access: yesDianxin kexue, 2020
Rootkit is a set of persistent and undetectable attack technologies,which can hide their attack behavior and backdoor trace by modifying software or kernel in operating system and changing execution path of instruction.Firstly,the basic definition and ...
Liyue CHEN   +4 more
doaj   +2 more sources

PRISTINE: An Emulation Platform for PCB-Level Hardware Trojans

open access: yesIEEE Access
Printed circuit Boards (PCBs) are becoming increasingly vulnerable to malicious design alteration, also known as Trojan attacks, due to a distributed business model that often involves various untrusted parties.
Junjun Huan   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy