Securing Hardware from Malicious Attacks

被引:0
|
作者
Abdelgawad, Mohamed M.A. [1 ]
Azer, Marianne A. [2 ]
机构
[1] Information and Communications Engineering, Berliner Hochschule für Technik, Berlin, Germany
[2] National Telecommunication Institute, Nile University, Cairo, Egypt
来源
TechRxiv | 2022年
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Intrusion detection
引用
收藏
相关论文
共 50 条
  • [41] Malicious Data Attacks on the Smart Grid
    Kosut, Oliver
    Jia, Liyan
    Thomas, Robert J.
    Tong, Lang
    IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) : 645 - 658
  • [42] Mitigation of malicious attacks on network observation
    Xiao Yan-Dong
    Lao Song-Yang
    Hou Lv-lin
    Bai Liang
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2015, 26 (10):
  • [43] Network Strengthening Against Malicious Attacks
    Rong, Qingnan
    Zhang, Jun
    Sun, Xiaoqian
    Wandelt, Sebastian
    COMPLEX NETWORKS AND THEIR APPLICATIONS VIII, VOL 1, 2020, 881 : 761 - 772
  • [44] Counteracting Attacks From Malicious End Hosts in Software Defined Networks
    Varadharajan, Vijay
    Tupakula, Uday
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (01): : 160 - 174
  • [45] Using attack trees to identify malicious attacks from authorized insiders
    Ray, I
    Poolsapassit, N
    COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 231 - 246
  • [46] Facial Biometric for Securing Hardware Accelerators
    Sengupta, Anirban
    Rathor, Mahendra
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2021, 29 (01) : 112 - 123
  • [47] Securing Schools against Terrorist Attacks
    Hoskova-Mayerova, Sarka
    Bekesiene, Svajone
    Benova, Petra
    SAFETY, 2021, 7 (01)
  • [48] Securing Websites Against Homograph Attacks
    Abawajy, Jemal
    Richard, A.
    Al Aghbari, Zaher
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 239 : 47 - 59
  • [49] Securing Cyber-Physical Systems from Hardware Trojan Collusion
    Liu, Chen
    Cronin, Patrick
    Yang, Chengmo
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (03) : 655 - 667
  • [50] Securing smart vehicles from relay attacks using machine learning
    Ahmad, Usman
    Song, Hong
    Bilal, Awais
    Alazab, Mamoun
    Jolfaei, Alireza
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (04): : 2665 - 2682