Results 41 to 50 of about 32,602 (220)

Analisa Pendeteksian Worm Dan Trojan Pada Jaringan Internet Universitas Semarang Menggunakan Metode Kalsifikasi Pada Data Mining C45 Dan Bayesian Network [PDF]

open access: yes, 2017
Worm attacks become a dangerous threat and cause damage in the Internet network. If the Internet network worms and trojan attacks the very disruption of traffic data as well as create bandwidth capacity has increased and wasted making the Internet ...
Prathivi, R. (Rastri), Vydia, V. (Vensy)
core   +3 more sources

Gate-Level Hardware Trojan Detection Method for Graph Neural Networks Based on Controllability Metrics [PDF]

open access: yesJisuanji gongcheng
With the continuous increase in globalization, third-party Intellectual Property (IP) core applications have become increasingly widespread. The gradual maturity of hardware Trojan attack technology enables the implantation of hardware Trojan in the chip
Yang ZHANG, Chang LIU, Shaoqing LI
doaj   +1 more source

Statistical screening for IC Trojan detection [PDF]

open access: yes2012 IEEE International Symposium on Circuits and Systems, 2012
We present statistical screening of test vectors for detecting a Trojan, malicious circuitry hidden inside an integrated circuit (IC). When applied a test vector, a Trojan-embedded chip draws extra leakage current that is unfortunately too small for the detector in most cases and concealed by process variation related to chip fabrication. To remedy the
oungjune Gwon   +4 more
openaire   +1 more source

Nanotherapies for Atherosclerosis: Targeting, Catalysis, and Energy Transduction

open access: yesAdvanced Healthcare Materials, EarlyView.
Atherosclerosis management is hindered by poor drug targeting and plaque heterogeneity. Nanotechnology overcomes these barriers via three core strategies: (1) target‐engineered nanocarriers that achieve lesion‐specific precision via ligand modification, biomimetic camouflage, stimuli‐responsive release, and self‐propelling nanomotors; (2) catalytic ...
Yuqi Yang   +4 more
wiley   +1 more source

AVATAR: NN-Assisted Variation Aware Timing Analysis and Reporting for Hardware Trojan Detection

open access: yesIEEE Access, 2021
This paper presents AVATAR, a learning-assisted Trojan testing flow to detect hardware Trojans placed into fabricated ICs at an untrusted foundry, without needing a Golden IC.
Ashkan Vakil   +4 more
doaj   +1 more source

Tumor‐Derived Exosomes Deliver Membrane‐Bound Fgl2 to Activate FcγRIIB‐Mediated Immunosuppression in Myeloid‐Derived Suppressor Cells

open access: yesAdvanced Science, EarlyView.
This study reveals that the Fgl2‐FcγRIIB signaling axis is a key mechanism by which MDSCs mediate tumor immune evasion. Tumor‐derived exosomes systemically activate MDSCs via this pathway, positioning this axis as a promising broad‐spectrum target for cancer immunotherapy.
Fenglin Lin   +12 more
wiley   +1 more source

A Survey on the Design, Detection, and Prevention of Pre-Silicon Hardware Trojans

open access: yesIEEE Access
The complexity of the semiconductor design lifecycle and globalized manufacturing process creates concern over the threat of deliberate malicious alterations, or hardware Trojans, being inserted into microelectronic designs.
Jonathan Cruz, Jason Hamlet
doaj   +1 more source

Hybrid multi‐level hardware Trojan detection platform for gate‐level netlists based on XGBoost

open access: yesIET Computers & Digital Techniques, 2022
Coping with the problem of malicious third‐party vendors implanting Hardware Trojan (HT) in the circuit design stage, this paper proposes a hybrid‐mode gate‐level hardware Trojan detection platform based on the XGBoost algorithm.
Ying Zhang   +6 more
doaj   +1 more source

Homomorphic Data Isolation for Hardware Trojan Protection

open access: yes, 2015
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr   +4 more
core   +1 more source

Survival of water ice in Jupiter Trojans [PDF]

open access: yes, 2014
Jupiter Trojans appear to be a key population of small bodies to study and test the models of the Solar System formation and evolution. Because understanding the evolution of Trojans can bring strong and unique constraints on the origins of our planetary
Guilbert-Lepoutre, Aurélie
core   +1 more source

Home - About - Disclaimer - Privacy