Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
trojan horse detection
biblio
Deep Learning Based Approach for Hardware Trojan Detection
Submitted by grigby1 on Thu, 05/19/2022 - 12:04pm
deep learning
Neural networks
pubcrawl
resilience
Resiliency
Hardware
Analytical models
composability
Trojan horses
Hardware Trojans
Transistors
Distance measurement
Non-Invasive approach
outlier detection
trojan horse detection
biblio
Low-overhead Solutions For Preventing Information Leakage Due To Hardware Trojan Horses
Submitted by grigby1 on Thu, 05/19/2022 - 12:03pm
Trojan horses
trojan horse detection
Information Leakage
CRC
mac
Microprocessors
Cyclones
Hardware Trojans
resource management
encryption
Runtime
composability
Hardware
FPGA
Resiliency
resilience
pubcrawl
biblio
A Stealthy Hardware Trojan Design and Corresponding Detection Method
Submitted by grigby1 on Thu, 05/19/2022 - 12:03pm
Hardware Security
trojan horse detection
imbalanced controllability
Observability
unsupervised clustering
Controllability
transition probability
Systematics
Hardware Trojans
pubcrawl
Trojan horses
Benchmark testing
composability
Integrated circuit modeling
Hardware
Resiliency
resilience
biblio
Formal Verification Approach to Detect Always-On Denial of Service Trojans in Pipelined Circuits
Submitted by grigby1 on Thu, 05/19/2022 - 12:03pm
Logic gates
pubcrawl
resilience
Resiliency
Integrated circuit modeling
system-on-chip
composability
Benchmark testing
Trojan horses
formal verification
Hardware Trojans
Scalability
denial of service
Microprocessors
Always-On
trojan horse detection
biblio
Hardware Trojan Detection Method for Inspecting Integrated Circuits Based on Machine Learning
Submitted by grigby1 on Thu, 05/19/2022 - 12:02pm
Logic gates
feature extraction
machine learning
pubcrawl
resilience
Resiliency
Hardware
composability
Trojan horses
supply chains
detection model
gate-level
hardware Trojan detection
Integrated circuit interconnections
trigger net
trojan horse detection
biblio
Genetic Algorithm based Hardware Trojan Detection
Submitted by grigby1 on Thu, 05/19/2022 - 12:02pm
transition probability
trojan horse detection
Trigger coverage
Test pattern generators
SCOAP
Logical Testing
ISCAS ’85 and 89
and Trojan coverage
masking
Communication Systems
genetic algorithm
pubcrawl
genetic algorithms
Trojan horses
hardware trojan
Benchmark testing
composability
integrated circuits
Hardware
Resiliency
resilience
biblio
Hardware Trojan Detection using Ring Oscillator
Submitted by grigby1 on Thu, 05/19/2022 - 11:59am
pubcrawl
resilience
Resiliency
Hardware
Integrated circuit modeling
composability
Benchmark testing
Transient analysis
Trojan horses
Hardware Trojans
Ring oscillators
Ring Oscillator
Transient Effect Ring Oscillator
Trojan detection
Xilinx Vivado
trojan horse detection
biblio
Detection of Hardware Trojan in Presence of Sneak Path in Memristive Nanocrossbar Circuits
Submitted by grigby1 on Thu, 05/19/2022 - 11:59am
pubcrawl
resilience
Resiliency
Hardware
composability
delays
hardware trojan
Trojan horses
testing
Degradation
Time measurement
Memristive
memristors
Nano crossbar
Sneak Path
trojan horse detection
biblio
An Experimental Analysis on Malware Detection in Executable Files using Machine Learning
Submitted by grigby1 on Thu, 05/19/2022 - 11:59am
malware
trojan horse detection
trojan horse
Executable Files
Adware
Virus
computer viruses
spyware
Trojan horses
tools
composability
internet
Resiliency
resilience
pubcrawl
Support vector machines
machine learning algorithms
machine learning
biblio
Hardware-Trojan Classification based on the Structure of Trigger Circuits Utilizing Random Forests
Submitted by grigby1 on Thu, 05/19/2022 - 11:59am
composability
trojan horse detection
netlist
hardware trojan
manufacturing
Hardware Security
Random Forest
Trojan horses
Benchmark testing
Internet of Things
integrated circuits
Hardware
Resiliency
resilience
pubcrawl
machine learning
feature extraction
1
2
3
4
5
6
7
next ›
last »