Journal articles on the topic 'Detection of Trojans'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Detection of Trojans.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Hazra, Suvadip, and Mamata Dalui. "CA-Based Detection of Coherence Exploiting Hardware Trojans." Journal of Circuits, Systems and Computers 29, no. 08 (October 18, 2019): 2050120. http://dx.doi.org/10.1142/s0218126620501200.
Full textWang, Lian Hai, and Qiu Liang Xu. "An APT Trojan Detection Method Based on Memory Forensics Techniques." Applied Mechanics and Materials 701-702 (December 2014): 927–34. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.927.
Full textZhao, Meng Meng, and Lian Hai Wang. "Research on Trojan Detection Method of Computer Memory Mirroring." Applied Mechanics and Materials 701-702 (December 2014): 1013–17. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.1013.
Full textRooney, Catherine, Amar Seeam, and Xavier Bellekens. "Creation and Detection of Hardware Trojans Using Non-Invasive Off-The-Shelf Technologies." Electronics 7, no. 7 (July 22, 2018): 124. http://dx.doi.org/10.3390/electronics7070124.
Full textPrathivi, Rastri, and Vensy Vydia. "ANALISA PENDETEKSIAN WORM dan TROJAN PADA JARINGAN INTERNET UNIVERSITAS SEMARANG MENGGUNAKAN METODE KALSIFIKASI PADA DATA MINING C45 dan BAYESIAN NETWORK." Jurnal Transformatika 14, no. 2 (January 30, 2017): 77. http://dx.doi.org/10.26623/transformatika.v14i2.440.
Full textYoshikawa, Masaya, Yusuke Mori, and Takeshi Kumaki. "Implementation Aware Hardware Trojan Trigger." Advanced Materials Research 933 (May 2014): 482–86. http://dx.doi.org/10.4028/www.scientific.net/amr.933.482.
Full textAmelian, Atieh, and Shahram Etemadi Borujeni. "A Side-Channel Analysis for Hardware Trojan Detection Based on Path Delay Measurement." Journal of Circuits, Systems and Computers 27, no. 09 (April 26, 2018): 1850138. http://dx.doi.org/10.1142/s0218126618501384.
Full textYin, Khin Swe, and May Aye Khine. "Optimal remote access trojans detection based on network behavior." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 3 (June 1, 2019): 2177. http://dx.doi.org/10.11591/ijece.v9i3.pp2177-2184.
Full textSheppard, Scott S., and Chadwick A. Trujillo. "Detection of a Trailing (L5) Neptune Trojan: Fig. 1." Science 329, no. 5997 (August 12, 2010): 1304. http://dx.doi.org/10.1126/science.1189666.
Full textReddy, Varun, and Nirmala Devi M. "FPGA Realization of Deep Neural Network for Hardware Trojan Detection." International Journal of Engineering & Technology 9, no. 3 (August 30, 2020): 764. http://dx.doi.org/10.14419/ijet.v9i3.30946.
Full textZhang, Kai, and Hang Yu. "Study on the Method of Android System Cloud Monitoring Information Based on SVM." Applied Mechanics and Materials 602-605 (August 2014): 2272–75. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.2272.
Full textLu, Jiazhong, Xiaolei Liu, Shibin Zhang, and Yan Chang. "Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning." Security and Communication Networks 2020 (November 25, 2020): 1–13. http://dx.doi.org/10.1155/2020/6641844.
Full textZou, Minhui, Xiaotong Cui, Liang Shi, and Kaijie Wu. "Potential Trigger Detection for Hardware Trojans." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 37, no. 7 (July 2018): 1384–95. http://dx.doi.org/10.1109/tcad.2017.2753201.
Full textMelosik, M., P. Sniatala, and W. Marszalek. "Hardware Trojans detection in chaos-based cryptography." Bulletin of the Polish Academy of Sciences Technical Sciences 65, no. 5 (October 1, 2017): 725–32. http://dx.doi.org/10.1515/bpasts-2017-0078.
Full textLillo-Box, J., A. Leleu, H. Parviainen, P. Figueira, M. Mallonn, A. C. M. Correia, N. C. Santos, et al. "The TROY project." Astronomy & Astrophysics 618 (October 2018): A42. http://dx.doi.org/10.1051/0004-6361/201833312.
Full textChevychelov, A. V., A. V. Burmistrov, and K. Yu Voyshhev. "Detecting malicious software using machine learning." Issues of radio electronics, no. 11 (November 20, 2019): 42–45. http://dx.doi.org/10.21778/2218-5453-2019-11-42-45.
Full text吴, 少华. "Study of Trojans Detection and Prevention Technology." Computer Science and Application 05, no. 12 (2015): 429–35. http://dx.doi.org/10.12677/csa.2015.512054.
Full textDong, Chen, Yulin Liu, Jinghui Chen, Ximeng Liu, Wenzhong Guo, and Yuzhong Chen. "An Unsupervised Detection Approach for Hardware Trojans." IEEE Access 8 (2020): 158169–83. http://dx.doi.org/10.1109/access.2020.3001239.
Full textAli, Liakot, and Farshad. "Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs." PLOS ONE 16, no. 7 (July 29, 2021): e0254903. http://dx.doi.org/10.1371/journal.pone.0254903.
Full textLillo-Box, J., D. Barrado, P. Figueira, A. Leleu, N. C. Santos, A. C. M. Correia, P. Robutel, and J. P. Faria. "The TROY project: Searching for co-orbital bodies to known planets." Astronomy & Astrophysics 609 (January 2018): A96. http://dx.doi.org/10.1051/0004-6361/201730652.
Full textKuznetsov, E., and A. Saurov. "Hardware Trojans. Part3: methods for prevention and detection." Nanoindustry Russia, no. 1 (2017): 30–40. http://dx.doi.org/10.22184/1993-8578.2017.71.1.30.40.
Full textCho, Mingi, Jaedong Jang, Yezee Seo, Seyeon Jeong, Soochang Chung, and Taekyoung Kwon. "Towards bidirectional LUT-level detection of hardware Trojans." Computers & Security 104 (May 2021): 102223. http://dx.doi.org/10.1016/j.cose.2021.102223.
Full textGraf, Jonathan, Whitney Batchelor, Scott Harper, Ryan Marlow, Edward Carlisle, and Peter Athanas. "A practical application of game theory to optimize selection of hardware Trojan detection strategies." Journal of Hardware and Systems Security 4, no. 2 (December 28, 2019): 98–119. http://dx.doi.org/10.1007/s41635-019-00089-3.
Full textFeng, Wen Feng, Lei Li, and Zhen Li. "A Method of Detecting Hardware Trojans Based on Side-Channel Analysis." Applied Mechanics and Materials 536-537 (April 2014): 558–61. http://dx.doi.org/10.4028/www.scientific.net/amm.536-537.558.
Full textWang, Jian, and Ying Li. "RDAMS: An Efficient Run-Time Approach for Memory Fault and Hardware Trojans Detection." Information 12, no. 4 (April 14, 2021): 169. http://dx.doi.org/10.3390/info12040169.
Full textDong, Chen, Yi Xu, Ximeng Liu, Fan Zhang, Guorong He, and Yuzhong Chen. "Hardware Trojans in Chips: A Survey for Detection and Prevention." Sensors 20, no. 18 (September 10, 2020): 5165. http://dx.doi.org/10.3390/s20185165.
Full textHaider, Syed Kamran, Chenglu Jin, Masab Ahmad, Devu Manikantan Shila, Omer Khan, and Marten van Dijk. "Advancing the State-of-the-Art in Hardware Trojans Detection." IEEE Transactions on Dependable and Secure Computing 16, no. 1 (January 1, 2019): 18–32. http://dx.doi.org/10.1109/tdsc.2017.2654352.
Full textBao, Chongxi, Domenic Forte, and Ankur Srivastava. "Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 34, no. 10 (October 2015): 1577–85. http://dx.doi.org/10.1109/tcad.2015.2424929.
Full textKarabacak, Fatih, Umit Ogras, and Sule Ozev. "Malicious Activity Detection in Lightweight Wearable and IoT Devices Using Signal Stitching." Sensors 21, no. 10 (May 13, 2021): 3408. http://dx.doi.org/10.3390/s21103408.
Full textLysenko, Sergiy, and Oleg Savenko. "Software for Computer Systems Trojans Detection as a Safety-Case Tool." Information & Security: An International Journal 28 (2012): 121–32. http://dx.doi.org/10.11610/isij.2810.
Full textChen, Zhe, Shize Guo, Jian Wang, Yubai Li, and Zhonghai Lu. "Toward FPGA Security in IoT: A New Detection Technique for Hardware Trojans." IEEE Internet of Things Journal 6, no. 4 (August 2019): 7061–68. http://dx.doi.org/10.1109/jiot.2019.2914079.
Full textReece, Trey, and William H. Robinson. "Detection of Hardware Trojans in Third-Party Intellectual Property Using Untrusted Modules." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 35, no. 3 (March 2016): 357–66. http://dx.doi.org/10.1109/tcad.2015.2459038.
Full textNguyen, Luong N., Chia-Lin Cheng, Milos Prvulovic, and Alenka Zajic. "Creating a Backscattering Side Channel to Enable Detection of Dormant Hardware Trojans." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 27, no. 7 (July 2019): 1561–74. http://dx.doi.org/10.1109/tvlsi.2019.2906547.
Full textDanesh, Wafi, Jaya Dofe, and Qiaoyan Yu. "Efficient Hardware Trojan Detection with Differential Cascade Voltage Switch Logic." VLSI Design 2014 (May 11, 2014): 1–11. http://dx.doi.org/10.1155/2014/652187.
Full textKanda, Guard, Seungyong Park, and Kwangki Ryoo. "Run-Time Hardware Trojans Detection Using On-Chip Bus for System-on-Chip Design." Journal of the Korea Institute of Information and Communication Engineering 20, no. 2 (February 29, 2016): 343–50. http://dx.doi.org/10.6109/jkiice.2016.20.2.343.
Full textTang, Yongkang, and Jianye Wang. "Built-in self-monitor-based finite state machines Trojans detection and self-lock defence." Journal of Engineering 2016, no. 4 (April 1, 2016): 62–63. http://dx.doi.org/10.1049/joe.2016.0012.
Full textZhou, Lei, Li-Yong Zhou, Rudolf Dvorak, and Jian Li. "Systematic survey of the dynamics of Uranus Trojans." Astronomy & Astrophysics 633 (January 2020): A153. http://dx.doi.org/10.1051/0004-6361/201936332.
Full textAl-Marghilani, A. "Comprehensive Analysis of IoT Malware Evasion Techniques." Engineering, Technology & Applied Science Research 11, no. 4 (August 21, 2021): 7495–500. http://dx.doi.org/10.48084/etasr.4296.
Full textZhang, Xuehui, Andrew Ferraiuolo, and Mohammad Tehranipoor. "Detection of trojans using a combined ring oscillator network and off-chip transient power analysis." ACM Journal on Emerging Technologies in Computing Systems 9, no. 3 (September 2013): 1–20. http://dx.doi.org/10.1145/2491677.
Full textVijayan, Arunkumar, Mehdi B. Tahoori, and Krishnendu Chakrabarty. "Runtime Identification of Hardware Trojans by Feature Analysis on Gate-Level Unstructured Data and Anomaly Detection." ACM Transactions on Design Automation of Electronic Systems 25, no. 4 (September 2, 2020): 1–23. http://dx.doi.org/10.1145/3391890.
Full textMarchand, Cédric, and Julien Francq. "Low‐level implementation and side‐channel detection of stealthy hardware trojans on field programmable gate arrays." IET Computers & Digital Techniques 8, no. 6 (November 2014): 246–55. http://dx.doi.org/10.1049/iet-cdt.2014.0034.
Full textAzeez, Nureni Ayofe, Oluwanifise Ebunoluwa Odufuwa, Sanjay Misra, Jonathan Oluranti, and Robertas Damaševičius. "Windows PE Malware Detection Using Ensemble Learning." Informatics 8, no. 1 (February 10, 2021): 10. http://dx.doi.org/10.3390/informatics8010010.
Full textLamech, Charles, Reza M. Rad, Mohammad Tehranipoor, and Jim Plusquellic. "An Experimental Analysis of Power and Delay Signal-to-Noise Requirements for Detecting Trojans and Methods for Achieving the Required Detection Sensitivities." IEEE Transactions on Information Forensics and Security 6, no. 3 (September 2011): 1170–79. http://dx.doi.org/10.1109/tifs.2011.2136339.
Full textKhan, Riaz Ullah, Xiaosong Zhang, Rajesh Kumar, Abubakar Sharif, Noorbakhsh Amiri Golilarz, and Mamoun Alazab. "An Adaptive Multi-Layer Botnet Detection Technique Using Machine Learning Classifiers." Applied Sciences 9, no. 11 (June 11, 2019): 2375. http://dx.doi.org/10.3390/app9112375.
Full textZhou, Jun, Mengquan Li, Pengxing Guo, and Weichen Liu. "Attack Mitigation of Hardware Trojans for Thermal Sensing via Micro-ring Resonator in Optical NoCs." ACM Journal on Emerging Technologies in Computing Systems 17, no. 3 (June 25, 2021): 1–23. http://dx.doi.org/10.1145/3433676.
Full textYusof, Muhammad, Madihah Mohd Saudi, and Farida Ridzuan. "Mobile Botnet Classification by using Hybrid Analysis." International Journal of Engineering & Technology 7, no. 4.15 (October 7, 2018): 103. http://dx.doi.org/10.14419/ijet.v7i4.15.21429.
Full textMehbodniya, Abolfazl, Izhar Alam, Sagar Pande, Rahul Neware, Kantilal Pitambar Rane, Mohammad Shabaz, and Mangena Venu Madhavan. "Financial Fraud Detection in Healthcare Using Machine Learning and Deep Learning Techniques." Security and Communication Networks 2021 (September 9, 2021): 1–8. http://dx.doi.org/10.1155/2021/9293877.
Full textPriya, Aayushi, Kajol Singh, and Rajeev Tiwari. "A Review on Malware Analysis by using an Approach of Machine Learning Techniques." IJOSTHE 3, no. 5 (January 4, 2019): 5. http://dx.doi.org/10.24113/ojssports.v3i5.86.
Full textMoriam, Sadia, Elke Franz, Paul Walther, Akash Kumar, Thorsten Strufe, and Gerhard Fettweis. "Efficient Communication Protection of Many-Core Systems against Active Attackers." Electronics 10, no. 3 (January 21, 2021): 238. http://dx.doi.org/10.3390/electronics10030238.
Full textWang, Ning. "Trojan Detection Simulation Group under the Cloud Computing Environment." Applied Mechanics and Materials 602-605 (August 2014): 1996–99. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.1996.
Full text