Securing Hardware from Malicious Attacks

被引:0
|
作者
Abdelgawad, Mohamed M.A. [1 ]
Azer, Marianne A. [2 ]
机构
[1] Information and Communications Engineering, Berliner Hochschule für Technik, Berlin, Germany
[2] National Telecommunication Institute, Nile University, Cairo, Egypt
来源
TechRxiv | 2022年
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Intrusion detection
引用
下载
收藏
相关论文
共 50 条
  • [21] Securing Photonic NoC Architectures from Hardware Trojans
    Pasricha, Sudeep
    Chittamuru, Sai Vineel Reddy
    Thakkar, Ishan G.
    Bhat, Varun
    2018 TWELFTH IEEE/ACM INTERNATIONAL SYMPOSIUM ON NETWORKS-ON-CHIP (NOCS), 2018,
  • [22] Towards Securing Medical Documents from Insider Attacks
    Bin Ahmad, Maaz
    Khan, Abdul Wahab
    Fahad, Muhammad
    Asif, Muhammad
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (08) : 357 - 360
  • [23] Efficiently Securing Systems from Code Reuse Attacks
    Kayaalp, Mehmet
    Ozsoy, Meltem
    Abu Ghazaleh, Nael
    Ponomarev, Dmitry
    IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (05) : 1144 - 1156
  • [24] Towards Securing Cloud Computing from DDOS Attacks
    Ahmed, Ishtiaq
    Ahmed, Sheeraz
    Nawaz, Asif
    Jan, Sadeeq
    Najam, Zeeshan
    Saadat, Muneeb
    Khan, Rehan Ali
    Zaman, Khalid
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (08) : 615 - 622
  • [25] Towards securing cloud computing from DDOS attacks
    Ahmed I.
    Ahmed S.
    Nawaz A.
    Jan S.
    Najam Z.
    Saadat M.
    Khan R.A.
    Zaman K.
    1600, Science and Information Organization (11): : 615 - 622
  • [26] Mitigation of malicious attacks on networks
    Schneider, Christian M.
    Moreira, Andre A.
    Andrade, Jose S.
    Havlin, Shlomo
    Herrmann, Hans J.
    PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2011, 108 (10) : 3838 - 3841
  • [27] Unorganized Malicious Attacks Detection
    Pang, Ming
    Gao, Wei
    Tao, Min
    Zhou, Zhi-Hua
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 31 (NIPS 2018), 2018, 31
  • [28] A classification of malicious software attacks
    Langweg, H
    Snekkenes, E
    CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 827 - 832
  • [29] The changing nature of malicious attacks
    Jones, Andy
    Computer Fraud and Security, 2008, 2008 (06): : 15 - 17
  • [30] Securing Smart Phones Against Malicious Exploits
    Rafique, M. Zubair
    Ahmed, Faraz
    Khan, Muhammad Khurram
    Farooq, Muddassar
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (02): : 903 - 922