Journal articles on the topic 'Trojans'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Trojans.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kakkara, Varsha, Karthi Balasubramanian, B. Yamuna, Deepak Mishra, Karthikeyan Lingasubramanian, and Senthil Murugan. "A Viterbi decoder and its hardware Trojan models: an FPGA-based implementation study." PeerJ Computer Science 6 (March 2, 2020): e250. http://dx.doi.org/10.7717/peerj-cs.250.
Full textHazra, Suvadip, and Mamata Dalui. "CA-Based Detection of Coherence Exploiting Hardware Trojans." Journal of Circuits, Systems and Computers 29, no. 08 (October 18, 2019): 2050120. http://dx.doi.org/10.1142/s0218126620501200.
Full textPirani, Simona, Anders Johansen, and Alexander J. Mustill. "On the inclinations of the Jupiter Trojans." Astronomy & Astrophysics 631 (October 25, 2019): A89. http://dx.doi.org/10.1051/0004-6361/201936600.
Full textLi, Dejian, Qizhi Zhang, Dongyan Zhao, Lei Li, Jiaji He, Yidong Yuan, and Yiqiang Zhao. "Hardware Trojan Detection Using Effective Property-Checking Method." Electronics 11, no. 17 (August 24, 2022): 2649. http://dx.doi.org/10.3390/electronics11172649.
Full textZhao, Meng Meng, and Lian Hai Wang. "Research on Trojan Detection Method of Computer Memory Mirroring." Applied Mechanics and Materials 701-702 (December 2014): 1013–17. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.1013.
Full textNapier, Kevin J., Larissa Markwardt, Fred C. Adams, David W. Gerdes, and Hsing Wen Lin. "A Collision Mechanism for the Removal of Earth's Trojan Asteroids." Planetary Science Journal 3, no. 5 (May 1, 2022): 121. http://dx.doi.org/10.3847/psj/ac6958.
Full textWang, Lian Hai, and Qiu Liang Xu. "An APT Trojan Detection Method Based on Memory Forensics Techniques." Applied Mechanics and Materials 701-702 (December 2014): 927–34. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.927.
Full textYoshikawa, Masaya, Yusuke Mori, and Takeshi Kumaki. "Implementation Aware Hardware Trojan Trigger." Advanced Materials Research 933 (May 2014): 482–86. http://dx.doi.org/10.4028/www.scientific.net/amr.933.482.
Full textPrathivi, Rastri, and Vensy Vydia. "ANALISA PENDETEKSIAN WORM dan TROJAN PADA JARINGAN INTERNET UNIVERSITAS SEMARANG MENGGUNAKAN METODE KALSIFIKASI PADA DATA MINING C45 dan BAYESIAN NETWORK." Jurnal Transformatika 14, no. 2 (January 30, 2017): 77. http://dx.doi.org/10.26623/transformatika.v14i2.440.
Full textRooney, Catherine, Amar Seeam, and Xavier Bellekens. "Creation and Detection of Hardware Trojans Using Non-Invasive Off-The-Shelf Technologies." Electronics 7, no. 7 (July 22, 2018): 124. http://dx.doi.org/10.3390/electronics7070124.
Full textYao, Jiaqi, Ying Zhang, and Chen Xin. "Network-on-Chip hardware Trojan detection platform based on machine learning." Journal of Physics: Conference Series 2189, no. 1 (February 1, 2022): 012004. http://dx.doi.org/10.1088/1742-6596/2189/1/012004.
Full textIbrahim, Mohanad R., and Karam Thanoon. "Quasar Remote Access Trojan feature extraction depending on Ethical Hacking." Technium: Romanian Journal of Applied Sciences and Technology 4, no. 1 (January 27, 2022): 58–75. http://dx.doi.org/10.47577/technium.v4i1.5831.
Full textYeager, Travis, and Nathan Golovich. "MEGASIM: Lifetimes and Resonances of Earth Trojan Asteroids—The Death of Primordial ETAs?" Astrophysical Journal 938, no. 1 (October 1, 2022): 9. http://dx.doi.org/10.3847/1538-4357/ac8e63.
Full textLi, Jian, Hanlun Lei, and Zhihong J. Xia. "Apsidal asymmetric-alignment of Jupiter Trojans." Monthly Notices of the Royal Astronomical Society 505, no. 2 (May 10, 2021): 1730–41. http://dx.doi.org/10.1093/mnras/stab1333.
Full textÉrdi, B. "On the dynamics of Trojan asteroids." Symposium - International Astronomical Union 172 (1996): 171–76. http://dx.doi.org/10.1017/s0074180900127305.
Full textLi, J., and Y. S. Sun. "Constructing a refined model of small bodies in the solar system." Astronomy & Astrophysics 616 (August 2018): A70. http://dx.doi.org/10.1051/0004-6361/201832809.
Full textBurger, Ch, E. Pilat-Lohinger, R. Dvorak, and A. Christaki. "Proper Elements and Stability of The Trojan Asteroids." International Astronomical Union Colloquium 172 (1999): 375–76. http://dx.doi.org/10.1017/s025292110007278x.
Full textHolt, Timothy R., David Vokrouhlický, David Nesvorný, Miroslav Brož, and Jonathan Horner. "A pair of Jovian Trojans at the L4 Lagrange point." Monthly Notices of the Royal Astronomical Society 499, no. 3 (October 6, 2020): 3630–49. http://dx.doi.org/10.1093/mnras/staa3064.
Full textBajcsy, Peter, Nicholas J. Schaub, and Michael Majurski. "Designing Trojan Detectors in Neural Networks Using Interactive Simulations." Applied Sciences 11, no. 4 (February 20, 2021): 1865. http://dx.doi.org/10.3390/app11041865.
Full textMilani, Andrea. "The Dynamics of the Trojan Asteroids." Symposium - International Astronomical Union 160 (1994): 159–74. http://dx.doi.org/10.1017/s0074180900046520.
Full textTimis, Grigore Mihai, and Alexandru Valachi. "Classification overview of the Hardware Trojans in digital circuits." Annals of “Dunarea de Jos“ University of Galati. Fascicle III, Electrotechnics, Electronics, Automatic Control, Informatics 43, no. 3 (December 29, 2020): 12–15. http://dx.doi.org/10.35219/eeaci.2020.3.02.
Full textAmelian, Atieh, and Shahram Etemadi Borujeni. "A Side-Channel Analysis for Hardware Trojan Detection Based on Path Delay Measurement." Journal of Circuits, Systems and Computers 27, no. 09 (April 26, 2018): 1850138. http://dx.doi.org/10.1142/s0218126618501384.
Full textDvorak, Rudolf, Li-Yong Zhou, and Helmut Baudisch. "Trojans in Exosystems with Two Massive Planets." Proceedings of the International Astronomical Union 8, S293 (August 2012): 152–58. http://dx.doi.org/10.1017/s1743921313012726.
Full textMaier, Felix K. "THE ALAMANNIC WAR WILL NOT TAKE PLACE—CONSTANTIUS’ II OPERATION AGAINST THE ALAMANNI IN 354." Classical Quarterly 68, no. 2 (October 23, 2018): 649–59. http://dx.doi.org/10.1017/s0009838818000356.
Full textABDULSALAM, Kadeejah, John ADEBISI, and Victor DUROJAIYE. "IMPLEMENTATION OF A HARDWARE TROJAN CHIP DETECTOR MODEL USING ARDUINO MICROCONTROLLER." Applied Computer Science 17, no. 4 (December 30, 2021): 20–33. http://dx.doi.org/10.35784/acs-2021-26.
Full textHorner, J., and P. S. Lykawka. "Planetary Trojans – the main source of short period comets?" International Journal of Astrobiology 9, no. 4 (July 27, 2010): 227–34. http://dx.doi.org/10.1017/s1473550410000212.
Full textWong, Ian, and Michael E. Brown. "Photometric Confirmation and Characterization of the Ennomos Collisional Family in the Jupiter Trojans." Astronomical Journal 165, no. 1 (December 16, 2022): 15. http://dx.doi.org/10.3847/1538-3881/ac9eb3.
Full textSimpson, Anna M., Michael E. Brown, Madeline J. Schemel, and Bryan J. Butler. "An ALMA Search for High-albedo Objects Among the Midsized Jupiter Trojan Population." Astronomical Journal 164, no. 1 (June 28, 2022): 23. http://dx.doi.org/10.3847/1538-3881/ac559e.
Full textYin, Khin Swe, and May Aye Khine. "Optimal remote access trojans detection based on network behavior." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 3 (June 1, 2019): 2177. http://dx.doi.org/10.11591/ijece.v9i3.pp2177-2184.
Full textXiao, K., D. Forte, Y. Jin, R. Karri, S. Bhunia, and M. Tehranipoor. "Hardware Trojans." ACM Transactions on Design Automation of Electronic Systems 22, no. 1 (December 28, 2016): 1–23. http://dx.doi.org/10.1145/2906147.
Full textDuke, David. "Downloader Trojans." Network Security 2002, no. 11 (November 2002): 4–5. http://dx.doi.org/10.1016/s1353-4858(02)11006-3.
Full textTimiş, Grigore Mihai, and Alexandru Valachi. "Triggering detection technique of the hardware trojans in the combinational logic systems." Annals of “Dunarea de Jos“ University of Galati. Fascicle III, Electrotechnics, Electronics, Automatic Control, Informatics 44, no. 1 (February 22, 2022): 23–28. http://dx.doi.org/10.35219/eeaci.2021.1.04.
Full textZhou, Lei, Yang-Bo Xu, Li-Yong Zhou, Rudolf Dvorak, and Jian Li. "Orbital stability of Earth Trojans." Astronomy & Astrophysics 622 (February 2019): A97. http://dx.doi.org/10.1051/0004-6361/201834026.
Full textReddy, Varun, and Nirmala Devi M. "FPGA Realization of Deep Neural Network for Hardware Trojan Detection." International Journal of Engineering & Technology 9, no. 3 (August 30, 2020): 764. http://dx.doi.org/10.14419/ijet.v9i3.30946.
Full textJain, Ayush, Ziqi Zhou, and Ujjwal Guin. "TAAL." ACM Transactions on Design Automation of Electronic Systems 26, no. 4 (April 2021): 1–22. http://dx.doi.org/10.1145/3442379.
Full textLillo-Box, J., A. Leleu, H. Parviainen, P. Figueira, M. Mallonn, A. C. M. Correia, N. C. Santos, et al. "The TROY project." Astronomy & Astrophysics 618 (October 2018): A42. http://dx.doi.org/10.1051/0004-6361/201833312.
Full textSheppard, Scott S., and Chadwick A. Trujillo. "Detection of a Trailing (L5) Neptune Trojan: Fig. 1." Science 329, no. 5997 (August 12, 2010): 1304. http://dx.doi.org/10.1126/science.1189666.
Full textPan, Jiaming, Hsing Wen Lin, David W. Gerdes, Kevin J. Napier, Jichi Wang, T. M. C. Abbott, M. Aguena, et al. "Photometric Properties of Jupiter Trojans Detected by the Dark Energy Survey." Planetary Science Journal 3, no. 12 (December 1, 2022): 269. http://dx.doi.org/10.3847/psj/aca4d1.
Full textHolt, Timothy R., David Nesvorný, Jonathan Horner, Rachel King, Raphael Marschall, Melissa Kamrowski, Brad Carter, Leigh Brookshaw, and Christopher Tylor. "Stability of Jovian Trojans and their collisional families." Monthly Notices of the Royal Astronomical Society 495, no. 4 (May 15, 2020): 4085–97. http://dx.doi.org/10.1093/mnras/staa1348.
Full textKazantsev, A., and L. Kazantseva. "On a possibility of transfer of the planet troyans to centaurs." Bulletin of Taras Shevchenko National University of Kyiv. Astronomy, no. 62 (2020): 20–23. http://dx.doi.org/10.17721/btsnua.2020.62.20-23.
Full textSun, Hai Tao, Jie Liu, Zhong Peng Liu, and Xun Lai He. "Design of Hardware Trojan Applying on Cryptogrammic-Board for PC." Advanced Materials Research 717 (July 2013): 794–96. http://dx.doi.org/10.4028/www.scientific.net/amr.717.794.
Full textLu, Yong Qiang, Fang Yong, and He Xiang. "The Research on Hybrid Communication Model for Trojan Based on P2P." Advanced Materials Research 791-793 (September 2013): 2038–42. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.2038.
Full textMaschall, Raphael, David Nesvorný, Rogerio Deienno, Ian Wong, Harold F. Levison, and William F. Bottke. "Implications for the Collisional Strength of Jupiter Trojans from the Eurybates Family." Astronomical Journal 164, no. 4 (September 29, 2022): 167. http://dx.doi.org/10.3847/1538-3881/ac8d6b.
Full textQi, Yi, and Anton de Ruiter. "Orbital analysis of small bodies in co-orbital motion with Jupiter through the torus structure." Monthly Notices of the Royal Astronomical Society 502, no. 2 (January 11, 2021): 2183–97. http://dx.doi.org/10.1093/mnras/stab063.
Full textMackie, C. J. "Zeus and Mount Ida in Homer’s Iliad." Antichthon 48 (2014): 1–13. http://dx.doi.org/10.1017/s0066477400004718.
Full textGasti, Helen. "Three notes on Virgil,Aeneid2." Cambridge Classical Journal 52 (2006): 128–33. http://dx.doi.org/10.1017/s1750270500000506.
Full textHellmich, S., S. Mottola, G. Hahn, E. Kührt, and D. de Niem. "Influence of the Yarkovsky force on Jupiter Trojan asteroids." Astronomy & Astrophysics 630 (October 2019): A148. http://dx.doi.org/10.1051/0004-6361/201834715.
Full textMontesinos, Matías, Juan Garrido-Deutelmoser, Johan Olofsson, Cristian A. Giuppone, Jorge Cuadra, Amelia Bayo, Mario Sucerquia, and Nicolás Cuello. "Dust trapping around Lagrangian points in protoplanetary disks." Astronomy & Astrophysics 642 (October 2020): A224. http://dx.doi.org/10.1051/0004-6361/202038758.
Full textPirani, S., A. Johansen, B. Bitsch, A. J. Mustill, and D. Turrini. "Consequences of planetary migration on the minor bodies of the early solar system." Astronomy & Astrophysics 623 (March 2019): A169. http://dx.doi.org/10.1051/0004-6361/201833713.
Full textMohan, Navya, and J. P. Anita. "Early Detection of Clustered Trojan Attacks on Integrated Circuits Using Transition Delay Fault Model." Cryptography 7, no. 1 (January 28, 2023): 4. http://dx.doi.org/10.3390/cryptography7010004.
Full text