Analisa Pendeteksian Worm Dan Trojan Pada Jaringan Internet Universitas Semarang Menggunakan Metode Kalsifikasi Pada Data Mining C45 Dan Bayesian Network [PDF]
Worm attacks become a dangerous threat and cause damage in the Internet network. If the Internet network worms and trojan attacks the very disruption of traffic data as well as create bandwidth capacity has increased and wasted making the Internet ...
Prathivi, R. (Rastri), Vydia, V. (Vensy)
core +3 more sources
Gate-Level Hardware Trojan Detection Method for Graph Neural Networks Based on Controllability Metrics [PDF]
With the continuous increase in globalization, third-party Intellectual Property (IP) core applications have become increasingly widespread. The gradual maturity of hardware Trojan attack technology enables the implantation of hardware Trojan in the chip
Yang ZHANG, Chang LIU, Shaoqing LI
doaj +1 more source
Statistical screening for IC Trojan detection [PDF]
We present statistical screening of test vectors for detecting a Trojan, malicious circuitry hidden inside an integrated circuit (IC). When applied a test vector, a Trojan-embedded chip draws extra leakage current that is unfortunately too small for the detector in most cases and concealed by process variation related to chip fabrication. To remedy the
oungjune Gwon +4 more
openaire +1 more source
Nanotherapies for Atherosclerosis: Targeting, Catalysis, and Energy Transduction
Atherosclerosis management is hindered by poor drug targeting and plaque heterogeneity. Nanotechnology overcomes these barriers via three core strategies: (1) target‐engineered nanocarriers that achieve lesion‐specific precision via ligand modification, biomimetic camouflage, stimuli‐responsive release, and self‐propelling nanomotors; (2) catalytic ...
Yuqi Yang +4 more
wiley +1 more source
AVATAR: NN-Assisted Variation Aware Timing Analysis and Reporting for Hardware Trojan Detection
This paper presents AVATAR, a learning-assisted Trojan testing flow to detect hardware Trojans placed into fabricated ICs at an untrusted foundry, without needing a Golden IC.
Ashkan Vakil +4 more
doaj +1 more source
This study reveals that the Fgl2‐FcγRIIB signaling axis is a key mechanism by which MDSCs mediate tumor immune evasion. Tumor‐derived exosomes systemically activate MDSCs via this pathway, positioning this axis as a promising broad‐spectrum target for cancer immunotherapy.
Fenglin Lin +12 more
wiley +1 more source
A Survey on the Design, Detection, and Prevention of Pre-Silicon Hardware Trojans
The complexity of the semiconductor design lifecycle and globalized manufacturing process creates concern over the threat of deliberate malicious alterations, or hardware Trojans, being inserted into microelectronic designs.
Jonathan Cruz, Jason Hamlet
doaj +1 more source
Hybrid multi‐level hardware Trojan detection platform for gate‐level netlists based on XGBoost
Coping with the problem of malicious third‐party vendors implanting Hardware Trojan (HT) in the circuit design stage, this paper proposes a hybrid‐mode gate‐level hardware Trojan detection platform based on the XGBoost algorithm.
Ying Zhang +6 more
doaj +1 more source
Homomorphic Data Isolation for Hardware Trojan Protection
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr +4 more
core +1 more source
Survival of water ice in Jupiter Trojans [PDF]
Jupiter Trojans appear to be a key population of small bodies to study and test the models of the Solar System formation and evolution. Because understanding the evolution of Trojans can bring strong and unique constraints on the origins of our planetary
Guilbert-Lepoutre, Aurélie
core +1 more source

