Securing Hardware from Malicious Attacks

被引:0
|
作者
Abdelgawad, Mohamed M.A. [1 ]
Azer, Marianne A. [2 ]
机构
[1] Information and Communications Engineering, Berliner Hochschule für Technik, Berlin, Germany
[2] National Telecommunication Institute, Nile University, Cairo, Egypt
来源
TechRxiv | 2022年
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Intrusion detection
引用
下载
收藏
相关论文
共 50 条
  • [31] Securing mobile auctions in the presence of malicious adversaries
    Zhu, Huafei
    Qiu, Ying
    Bao, Feng
    2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 433 - 437
  • [32] The Specter of Malicious Computing Securing the Internet of Things
    Beresford, Alastair
    Mascolo, Cecilia
    Gruteser, Marco
    IEEE PERVASIVE COMPUTING, 2018, 17 (03) : 10 - 11
  • [33] Detect Malicious Attacks from Entire TCP Communication Process
    Fang, Peng
    Huang, Liusheng
    Zhang, Xinyuan
    Xu, Hongli
    Wang, Shaowei
    NEURAL INFORMATION PROCESSING, ICONIP 2017, PT V, 2017, 10638 : 867 - 877
  • [34] Knowledge Discovery from Honeypot Data for Monitoring Malicious Attacks
    Jin, Huidong
    de Vel, Olivier
    Zhang, Ke
    Liu, Nianjun
    AI 2008: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2008, 5360 : 470 - +
  • [35] Securing MAODV: Attacks and countermeasures
    Roy, S
    Addada, VG
    Setia, S
    Jajodia, S
    2005 SECOND ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR AND AD HOC COMMUNICATIONS AND NETWORKS, 2005, : 521 - 532
  • [36] Securing Docker Containers from Denial of Service (DoS) Attacks
    Chelladhurai, Jeeva
    Chelliah, Pethuru Raj
    Kumar, Sathish Alampalayam
    PROCEEDINGS 2016 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2016), 2016, : 856 - 859
  • [37] Hunting Malicious Attacks in Social Networks
    Arulsuju, D.
    2011 THIRD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2011, : 13 - 16
  • [38] Are blockchains immune to all malicious attacks?
    Xu, Jennifer J.
    FINANCIAL INNOVATION, 2016, 2 (01)
  • [39] Reducing Network Vulnerability to Malicious Attacks
    Rayatidamavandi, Maede
    Conlon, Frank
    Rahnamay-Naeini, Mahshid
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2018, : 718 - 723
  • [40] A2: Analog Malicious Hardware
    Yang, Kaiyuan
    Hicks, Matthew
    Dong, Qing
    Austin, Todd
    Sylvester, Dennis
    2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 18 - 37