Πλοήγηση ανά Θέμα "Malware"
Αποτελέσματα 1-6 από 6
-
CAS-HtBase: a new database for the study of HTs at the pre-silicon stage of ASICs
(2022)Hardware Trojan (HT) consists a chip-level viruses which aim to leak encrypted information or degrade the performance of the infected device. They are a modification to the original design of a circuit and consist of two ... -
Conventional and machine learning approaches as countermeasures against hardware trojan attacks
(2020)Every year, the rate at which technology is applied on areas of our everyday life is increasing at a steady pace. This rapid development drives the technology companies to design and fabricate their integrated circuits ... -
Machine Learning for Hardware Trojan Detection: A Review
(2019)Every year, the rate at which technology is applied on areas of our everyday life is increasing at a steady pace. This rapid development drives the technology companies to design and fabricate their integrated circuits ... -
A machine-learning clustering approach for intrusion detection to IoT devices
(2019)Nowadays we see the sharp increase in smart devices on the internet and in the network of things. An ever increasing problem with these devices is their protection against malware and internet attacks because of their ... -
The next generation cognitive security operations center: Adaptive analytic lambda architecture for efficient defense against adversarial attacks
(2019)A Security Operations Center (SOC) is a central technical level unit responsible for monitoring, analyzing, assessing, and defending an organization’s security posture on an ongoing basis. The SOC staff works closely with ... -
The next generation cognitive security operations center: Network flow forensics using cybersecurity intelligence
(2018)A Security Operations Center (SOC) can be defined as an organized and highly skilled team that uses advanced computer forensics tools to prevent, detect and respond to cybersecurity incidents of an organization. The ...