Results 11 to 20 of about 32,602 (220)

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

Hardware Trojan detection method based upon XGBoost model

open access: yesDianzi Jishu Yingyong, 2019
This paper proposed a hardware Trojan detection method based upon XGBoost(eXtreme Gradient Boosting) model by using the analysis results of ring oscillator network, and used the cross-validation method to optimize the model.
Gao Hongbo   +3 more
doaj   +1 more source

Hardware Trojan Detection Based on Improved Euclidean Distance [PDF]

open access: yesJisuanji gongcheng, 2017
The accuracy of the hardware Trojan detection method based on the traditional Euclidean distance discrimination is too low to meet the demand.For this reason,the side-channel power consumption information is collected and analized in this paper,and an ...
WANG Jianxin,WANG Boren,QU Ming,ZHANG Lei
doaj   +1 more source

Observational Constraints on Trojans of Transiting Extrasolar Planets [PDF]

open access: yes, 2006
Theoretical studies predict that Trojans are likely a frequent byproduct of planet formation and evolution. We present a novel method of detecting Trojan companions to transiting extrasolar planets which involves comparing the time of central eclipse ...
Ford, Eric B., Gaudi, B. Scott
core   +3 more sources

Research on hardware Trojan defense

open access: yes网络与信息安全学报, 2017
The definition and features of hardware Trojan were described firstly.After that,recent researches of defense and detection techniques were categorized with complete comparison and analysis.Then,current researches limitations were discussed based on the ...
Kan WANG   +3 more
doaj   +3 more sources

Creation and detection of hardware trojans using non-invasive off-the-shelf technologies [PDF]

open access: yes, 2018
As a result of the globalisation of the semiconductor design and fabrication processes, integrated circuits are becoming increasingly vulnerable to malicious attacks. The most concerning threats are hardware trojans.
Bellekens, Xavier   +2 more
core   +5 more sources

Hardware Trojan Identification and Detection

open access: yesInternational Journal on Cryptography and Information Security, 2017
ABSTRACT The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques.
Moein, Samer   +3 more
openaire   +1 more source

Research on Influencing Factor of Hardware Trojan Side-channel Detection Method [PDF]

open access: yesJisuanji gongcheng, 2019
The side-channel detection method screens the hardware Trojan circuit by collecting physical parameters such as power consumption,delay,and electromagnetic field,but its detection performance is seriously affected by process fluctuation,and process ...
LI Ying,CHEN Lan,ZHOU Yinhao
doaj   +1 more source

Hardware trojan detection based on the optimized SVM algorithm

open access: yesDianzi Jishu Yingyong, 2018
The main research direction of hardware trojan detection is based on the side channel analysis. This paper proposes an optimized support vector machine(SVM) classification method to improve the accuracy and speed when analyzing the data for detection ...
Zhang Lei   +3 more
doaj   +1 more source

A machine learning method for hardware Trojan detection on real chips

open access: yesAIP Advances, 2021
Due to the global supply chain of integrated circuits (IC) from design to application, Hardware Trojan (HT) may be stealthily inserted into ICs. The effect of HT detection methods are related to the signal-to-noise ratio (SNR) and the Trojan-to-circuit ...
C. Sun   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy