Securing Hardware from Malicious Attacks

被引:0
|
作者
Abdelgawad, Mohamed M.A. [1 ]
Azer, Marianne A. [2 ]
机构
[1] Information and Communications Engineering, Berliner Hochschule für Technik, Berlin, Germany
[2] National Telecommunication Institute, Nile University, Cairo, Egypt
来源
TechRxiv | 2022年
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Intrusion detection
引用
收藏
相关论文
共 50 条
  • [41] Reducing Network Vulnerability to Malicious Attacks
    Rayatidamavandi, Maede
    Conlon, Frank
    Rahnamay-Naeini, Mahshid
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2018, : 718 - 723
  • [42] Mitigation of malicious attacks on network observation
    Xiao Yan-Dong
    Lao Song-Yang
    Hou Lv-lin
    Bai Liang
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2015, 26 (10):
  • [43] Malicious Data Attacks on the Smart Grid
    Kosut, Oliver
    Jia, Liyan
    Thomas, Robert J.
    Tong, Lang
    IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) : 645 - 658
  • [44] Network Strengthening Against Malicious Attacks
    Rong, Qingnan
    Zhang, Jun
    Sun, Xiaoqian
    Wandelt, Sebastian
    COMPLEX NETWORKS AND THEIR APPLICATIONS VIII, VOL 1, 2020, 881 : 761 - 772
  • [45] Securing Authentication and Detecting Malicious Entities in Drone Missions
    Constantinescu, Nicolae
    Ticleanu, Oana-Adriana
    Hunyadi, Ioan Daniel
    DRONES, 2024, 8 (12)
  • [46] Using attack trees to identify malicious attacks from authorized insiders
    Ray, I
    Poolsapassit, N
    COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 231 - 246
  • [47] Counteracting Attacks From Malicious End Hosts in Software Defined Networks
    Varadharajan, Vijay
    Tupakula, Uday
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (01): : 160 - 174
  • [48] Facial Biometric for Securing Hardware Accelerators
    Sengupta, Anirban
    Rathor, Mahendra
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2021, 29 (01) : 112 - 123
  • [49] Securing Schools against Terrorist Attacks
    Hoskova-Mayerova, Sarka
    Bekesiene, Svajone
    Benova, Petra
    SAFETY, 2021, 7 (01)
  • [50] Securing Cyber-Physical Systems from Hardware Trojan Collusion
    Liu, Chen
    Cronin, Patrick
    Yang, Chengmo
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (03) : 655 - 667