|
|
|
Thomas Mountford, Abhijitt Dhavlle, Andrew Tevebaugh, Naseef Mansoor, Sai Manoj Pudukotai Dinakarrao and Amlan Ganguly
In modern computing, which relies on the interconnection of networks used in many/multi-core systems, any system can be critically subverted if the interconnection is compromised. This can be done in a multitude of ways, but the threat of a hardware Troj...
ver más
|
|
|
|
|
|
|
Thejaswini P, Vivekananda G, Anu H, Priya R, Krishna Prasad B S, Nischay M
Pág. 370 - 388
Today's Multiprocessor System-on-Chip (MPSoC) contains many cores and integrated circuits. Due to the current requirements of communication, we make use of Network-on-Chip (NoC) to obtain high throughput and low latency. NoC is a communication architectu...
ver más
|
|
|
|
|
|
|
Peter Bajcsy, Nicholas J. Schaub and Michael Majurski
This paper addresses the problem of designing trojan detectors in neural networks (NNs) using interactive simulations. Trojans in NNs are defined as triggers in inputs that cause misclassification of such inputs into a class (or classes) unintended by th...
ver más
|
|
|
|
|
|
|
Yaxi Pan, Ling Zhang and Duan Huang
As the existence of non-zero reflection coefficients in the real component of continuous-variable quantum key distribution (CV-QKD) systems, Eve can probe the system by sending the bright light pulses into Alice?s set-up. With the analysis of back-reflec...
ver más
|
|
|
|
|
|
|
Gaute Wangen
The recent emergence of the targeted use of malware in cyber espionage versus industry requires a systematic review for better understanding of its impact and mechanism. This paper proposes a basic taxonomy to document major cyber espionage incidents, de...
ver más
|
|
|
|