Results 11 to 20 of about 32,602 (220)
Adaptive secure malware efficient machine learning algorithm for healthcare data
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed +8 more
wiley +1 more source
Hardware Trojan detection method based upon XGBoost model
This paper proposed a hardware Trojan detection method based upon XGBoost(eXtreme Gradient Boosting) model by using the analysis results of ring oscillator network, and used the cross-validation method to optimize the model.
Gao Hongbo +3 more
doaj +1 more source
Hardware Trojan Detection Based on Improved Euclidean Distance [PDF]
The accuracy of the hardware Trojan detection method based on the traditional Euclidean distance discrimination is too low to meet the demand.For this reason,the side-channel power consumption information is collected and analized in this paper,and an ...
WANG Jianxin,WANG Boren,QU Ming,ZHANG Lei
doaj +1 more source
Observational Constraints on Trojans of Transiting Extrasolar Planets [PDF]
Theoretical studies predict that Trojans are likely a frequent byproduct of planet formation and evolution. We present a novel method of detecting Trojan companions to transiting extrasolar planets which involves comparing the time of central eclipse ...
Ford, Eric B., Gaudi, B. Scott
core +3 more sources
Research on hardware Trojan defense
The definition and features of hardware Trojan were described firstly.After that,recent researches of defense and detection techniques were categorized with complete comparison and analysis.Then,current researches limitations were discussed based on the ...
Kan WANG +3 more
doaj +3 more sources
Creation and detection of hardware trojans using non-invasive off-the-shelf technologies [PDF]
As a result of the globalisation of the semiconductor design and fabrication processes, integrated circuits are becoming increasingly vulnerable to malicious attacks. The most concerning threats are hardware trojans.
Bellekens, Xavier +2 more
core +5 more sources
Hardware Trojan Identification and Detection
ABSTRACT The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques.
Moein, Samer +3 more
openaire +1 more source
Research on Influencing Factor of Hardware Trojan Side-channel Detection Method [PDF]
The side-channel detection method screens the hardware Trojan circuit by collecting physical parameters such as power consumption,delay,and electromagnetic field,but its detection performance is seriously affected by process fluctuation,and process ...
LI Ying,CHEN Lan,ZHOU Yinhao
doaj +1 more source
Hardware trojan detection based on the optimized SVM algorithm
The main research direction of hardware trojan detection is based on the side channel analysis. This paper proposes an optimized support vector machine(SVM) classification method to improve the accuracy and speed when analyzing the data for detection ...
Zhang Lei +3 more
doaj +1 more source
A machine learning method for hardware Trojan detection on real chips
Due to the global supply chain of integrated circuits (IC) from design to application, Hardware Trojan (HT) may be stealthily inserted into ICs. The effect of HT detection methods are related to the signal-to-noise ratio (SNR) and the Trojan-to-circuit ...
C. Sun +5 more
doaj +1 more source

