The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for trojan with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1978-1996 (16) 1997-2002 (22) 2003-2004 (15) 2005-2006 (18) 2007-2008 (40) 2009 (27) 2010 (22) 2011 (30) 2012 (24) 2013 (35) 2014 (40) 2015 (62) 2016 (51) 2017 (75) 2018 (93) 2019 (95) 2020 (110) 2021 (110) 2022 (131) 2023 (129) 2024 (20)
Publication types (Num. hits)
article(494) data(2) incollection(6) inproceedings(655) phdthesis(8)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 122 occurrences of 104 keywords

Results
Found 1182 publication records. Showing 1165 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
253Mohammad Tehranipoor, Farinaz Koushanfar A Survey of Hardware Trojan Taxonomy and Detection. Search on Bibsonomy IEEE Des. Test Comput. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF hardware Trojans, Trojan taxonomy and detection, security, design and test, ICs
115Francis G. Wolff, Christos A. Papachristou, Swarup Bhunia, Rajat Subhra Chakraborty Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme. Search on Bibsonomy DATE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
94Lang Lin, Markus Kasper, Tim Güneysu, Christof Paar, Wayne P. Burleson Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Trojan Hardware, Trojan Side-Channel, Hardware Trojan Detection, Covert Channel, Side-Channel Analysis
86Rajat Subhra Chakraborty, Francis G. Wolff, Somnath Paul, Christos A. Papachristou, Swarup Bhunia MERO: A Statistical Approach for Hardware Trojan Detection. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
86Susmit Jha, Sumit Kumar Jha 0001 Randomization Based Probabilistic Approach to Detect Trojan Circuits. Search on Bibsonomy HASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
86Yier Jin, Yiorgos Makris Hardware Trojan Detection Using Path Delay Fingerprint. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
72Daeyeon Park, Rafael H. Saavedra Trojan: A High-Performance Simulator for Shared Memory Architectures. Search on Bibsonomy Annual Simulation Symposium The full citation details ... 1996 DBLP  DOI  BibTeX  RDF virtual-memory simulation, application annotation, execution-driven simulation, copy-on-write
65Miodrag Potkonjak, Ani Nahapetian, Michael Nelson 0002, Tammara Massey Hardware Trojan horse detection using gate-level characterization. Search on Bibsonomy DAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hardware Trojan horses, gate-level characterization, linear programming, manufacturing variability
58Reza M. Rad, Xiaoxiao Wang 0001, Mohammad Tehranipoor, Jim Plusquellic Power supply signal calibration techniques for improving detection resolution to hardware Trojans. Search on Bibsonomy ICCAD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
58Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang Trojan horse resistant discretionary access control. Search on Bibsonomy SACMAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF access control, operating system, information flow
58Rajat Subhra Chakraborty, Somnath Paul, Swarup Bhunia On-Demand Transparency for Improving Hardware Trojan Detectability. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
58Xiaoxiao Wang 0001, Hassan Salmani, Mohammad Tehranipoor, James F. Plusquellic Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis. Search on Bibsonomy DFT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
58Dakshi Agrawal, Selçuk Baktir, Deniz Karakoyunlu, Pankaj Rohatgi, Berk Sunar Trojan Detection using IC Fingerprinting. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
58Chain-Wu Lee, Chun-Hsi Huang, Sanguthevar Rajasekaran TROJAN: A Scalable Distributed Semantic Network System. Search on Bibsonomy ICTAI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
58Eun-Sun Cho, Sunho Hong, Sechang Oh, Hongjin Yeh, Manpyo Hong, Cheol Won Lee, Hyundong Park, Chun-Sik Park SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying Codes. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
51Elena Andreeva 0001, Charles Bouillaguet, Orr Dunkelman, John Kelsey Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Herding attack, Trojan message attack, Zipper hash, Concatenated hash, Tree hash, Second preimage attack
43Mainak Banga, Michael S. Hsiao A Region Based Approach for the Identification of Hardware Trojans. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Jinye Peng, GuangQiang He, Jin Xiong, Guihua Zeng Trojan Horse Attack Strategy on Quantum Private Communication. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
43Micha Moffie, Winnie Cheng, David R. Kaeli, Qin Zhao Hunting Trojan Horses. Search on Bibsonomy ASID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information flow control, program monitoring, run time environment, data labeling
36Sheng Wei 0001, Saro Meguerdichian, Miodrag Potkonjak Gate-level characterization: foundations and hardware security applications. Search on Bibsonomy DAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF gate-level characterization, hardware Trojan horse, thermal conditioning, manufacturing variability
36Patrick Schaumont, Alex K. Jones, Steve Trimberger Guest Editors' Introduction to Security in Reconfigurable Systems Design. Search on Bibsonomy ACM Trans. Reconfigurable Technol. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Trojan, Trustworthy design, side-channel resistant design, physically unclonable function
36Mainak Banga, Maheshwar Chandrasekar, Lei Fang 0002, Michael S. Hsiao Guided test generation for isolation and detection of embedded trojans in ics. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF trojan
36Muazzam Siddiqui, Morgan C. Wang, Joohan Lee Detecting Trojans Using Data Mining Techniques. Search on Bibsonomy IMTIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Trojan Detection, Data Mining, Support Vector Machines, Principal Component Analysis, Random Forest, Disassembly
36Tzer-Shyong Chen, Fuh-Gwo Jeng, Yu-Chia Liu Hacking Tricks Toward Security on Network Environments. Search on Bibsonomy PDCAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hacking tricks, Trojan programs, Intrusion detection system, Firewall, Phishing
36Sharon R. Lewis, Simon R. Wiseman Securing an Object Relational Database. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF bject-oriented databases, object relational database security, Trojan Horse software, business constraints, accounting information, risks, COTS, commercial off the shelf, data access, security labelling
36R. E. Niemeyer Using Web Technologies in Two MLS Environments: A Security Analysis. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF World Wide Web technologies, multi-level secure systems, single-level network environments, Web browser software, security sensitivity level, information transfer, security boundaries, security classification, network client, malicious code insertion, Trojan horse code, primary information flow direction, Internet, HTTP, Web server, security of data, intranet, threats, security vulnerabilities, computer viruses, database server, HyperText Transfer Protocol, denial of service attacks
36John Clark 0002, Sylvain P. Leblanc, Scott Knight Hardware Trojan Horse Device Based on Unintended USB Channels. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hardware Trojan Horse Device, Unintended USB Channel
36John P. McDermott Position Paper: Prolepsis on the Problem of Trojan-horse Based Integrity Attacks. Search on Bibsonomy Workshop on New Security Paradigms The full citation details ... 1998 DBLP  DOI  BibTeX  RDF trojan horse, security, integrity, storage
34J. A. Guerrero-Vargas, L. Carvalho Trojan, Estevam Barbosa de Las Casas, Diego Alexander Garzón-Alvarado Finite element analysis of the influence of interdigitation pattern and collagen fibers on the mechanical behavior of the midpalatal suture. Search on Bibsonomy Medical Biol. Eng. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
34Bilkis Mitu, Václav Trojan, Lenka Halámková Sex Determination of Human Nails Based on Attenuated Total Reflection Fourier Transform Infrared Spectroscopy in Forensic Context. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
34Lenon Diniz Seixas, Fernanda Cristina Corrêa, Hugo Valadares Siqueira, Flavio Trojan, Paulo Afonso Vehicle Industry Big Data Analysis Using Clustering Approaches. Search on Bibsonomy OL2A (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
34Hans Friedrich Witschel, Emanuele Laurenzi, Stephan Jüngling, Y. Kadvany, A. Trojan An Early Warning System that combines Machine Learning and a Rule-Based Approach for the Prediction of Cancer Patients' Unplanned Visits. Search on Bibsonomy AAAI Spring Symposium: MAKE The full citation details ... 2023 DBLP  BibTeX  RDF
34Grzegorz Swiderski, Bartosz Trojan About essential spectra of unbounded Jacobi matrices. Search on Bibsonomy J. Approx. Theory The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
34Grzegorz Swiderski, Bartosz Trojan Asymptotic behavior of Christoffel-Darboux kernel via three-term recurrence relation II. Search on Bibsonomy J. Approx. Theory The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
34Olaf Brandt, Holger Gauza, Steve Kaminski, Mario Trojan, Thorsten Trippel, Johannes Werner Extending the CMDI Universe Metadata for Bioinformatics Data. Search on Bibsonomy CLARIN Annual Conference The full citation details ... 2020 DBLP  BibTeX  RDF
34Bruno Samways dos Santos, Maria Teresinha Arns Steiner, Amanda Trojan Fenerich, Rafael Henrique Palma Lima Data mining and machine learning techniques applied to public health problems: A bibliometric analysis from 2009 to 2018. Search on Bibsonomy Comput. Ind. Eng. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
34Przemyslaw Trojan Agent-based provision of system services. Search on Bibsonomy 2019   RDF
34Eric Glende, Przemyslaw Trojan, Ines Hauer, André Naumann, Christoph Brosinsky, Martin Wolter, Dirk Westermann Communication Infrastructure for Dynamic Grid Control Center with a Hardware-in-the-Loop Model. Search on Bibsonomy ISGT Europe The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
34Jack Brooks, Jörg Trojan The Cutaneous Rabbit Effect: Phenomenology and saltation. Search on Bibsonomy Scholarpedia The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
34Grzegorz Swiderski, Bartosz Trojan Periodic perturbations of unbounded Jacobi matrices I: Asymptotics of generalized eigenvectors. Search on Bibsonomy J. Approx. Theory The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
34Karol Korczak, Anna Kasielska-Trojan, Marian Niedzwiedzinski, Boguslaw Antoszewski A computer-supported management of photographic documentation in plastic surgery - System development and its clinical application. Search on Bibsonomy Comput. Biol. Medicine The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
34Farnood Gholami, Daria A. Trojan, József Kövecses, Wassim M. Haddad, Behnood Gholami A Microsoft Kinect-Based Point-of-Care Gait Assessment Framework for Multiple Sclerosis Patients. Search on Bibsonomy IEEE J. Biomed. Health Informatics The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
34Pavel Taraba, Jakub Trojan, Veronika Kavkova Development of the knowledge system based on formation of holistic competence of project managers in the Czech Republic. Search on Bibsonomy CSIT (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
34Stefan Oberhoff, Kay Goetz, Karin Trojan, Martin Zoeller, Joachim Glueck Application of high frequency scanning acoustic microscopy for the failure analysis and reliability assessment of MEMS sensors. Search on Bibsonomy Microelectron. Reliab. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
34Farnood Gholami, Daria A. Trojan, József Kövecses, Wassim M. Haddad, Behnood Gholami Gait Assessment for Multiple Sclerosis Patients Using Microsoft Kinect. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
34Matheus Trevisan Moreira, Guilherme Trojan, Fernando Gehm Moraes, Ney Laert Vilar Calazans Spatially Distributed Dual-Spacer Null Convention Logic Design. Search on Bibsonomy J. Low Power Electron. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
34Stefan Engelen, Ladislas A. Trojan, Sophie Sacquin-Mora, Richard Lavery, Alessandra Carbone Joint Evolutionary Trees: A Large-Scale Method To Predict Protein Interfaces Based on Sequence Sampling. Search on Bibsonomy PLoS Comput. Biol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Rupert Hölzl 0002, Jörg Trojan, Dieter Kleinböhl Dynamic Perceptual Maps - A Psychophysical Approach to Spatiotemporal Interactions and Plasticity in Body Perception. Search on Bibsonomy WHC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Zdenek Trefny, J. Svacinka, S. Trojan, J. Slavicek, Pavel Smrcka, Martin Trefny Automatic Evaluation of the Quantitative Seismocardiogram. Search on Bibsonomy ICEIS (2) The full citation details ... 2007 DBLP  BibTeX  RDF
34Zdenek Trefny, J. Svacinka, S. Trojan, J. Slavicek, Pavel Smrcka, Karel Hána A new method for the evaluation of the signal acquired from quantitative seismocardiograph - hardware and software solution for the new field of monitoring heart activity. Search on Bibsonomy ICINCO-SPSMC The full citation details ... 2006 DBLP  BibTeX  RDF
34Madan M. Gupta, Jerzy B. Kiszka, George M. Trojan Multivariable Structure of Fuzzy Control Systems. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
34Madan M. Gupta, George M. Trojan, Jerzy B. Kiszka Controllability of Fuzzy Control Systems. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
34George M. Trojan Lower Bounds and Fast Algorithms for Sequence Acceleration. Search on Bibsonomy J. ACM The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
29Mainak Banga, Michael S. Hsiao A Novel Sustained Vector Technique for the Detection of Hardware Trojans. Search on Bibsonomy VLSI Design The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Reza M. Rad, Jim Plusquellic, Mohammad Tehranipoor Sensitivity Analysis to Hardware Trojans using Power Supply Transient Signals. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Xiaoxiao Wang 0001, Mohammad Tehranipoor, Jim Plusquellic Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Adam L. Young, Moti Yung Malicious Cryptography: Kleptographic Aspects. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Rabin, malicious cryptography, RSA, public key cryptography, attacks, random oracle, security threats, kleptography, SETUP
29Yongwha Chung, Daesung Moon, Taehae Kim, Sung Bum Pan A Secure Fingerprint Authentication System on an Untrusted Computing Environment. Search on Bibsonomy TrustBus The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Untrusted Clients, Embedded Sensors, Biometrics, Fingerprint Verification
29Brian D. Carrier, Blake Matheny Methods for Cluster-Based Incident Detection. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Jonathan T. Trostle Timing Attacks Against Trusted Path. Search on Bibsonomy S&P The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
29Elisa Bertino, Pierangela Samarati, Sushil Jajodia High Assurance Discretionary Access Control for Object Bases. Search on Bibsonomy CCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
29Myong H. Kang, Ira S. Moskowitz A Pump for Rapid, Reliable, Secure Communication. Search on Bibsonomy CCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
29Francis G. Wolff, Christos A. Papachristou An Embedded Flash Memory Vault for Software Trojan Protection. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Yousra Alkabani, Farinaz Koushanfar Designer's Hardware Trojan Horse. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Jie Li, John C. Lach At-Speed Delay Characterization for IC Authentication and Trojan Horse Detection. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Michael Franz Containing the Ultimate Trojan Horse. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Ryotaro Negishi, Tatsuki Kurihara, Nozomu Togawa Hardware-Trojan Detection at Gate-Level Netlists Using a Gradient Boosting Decision Tree Model and Its Extension Using Trojan Probability Propagation. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
29Satyaki Nan, Swastik Brahma Hardware Trojan Testing with Hierarchical Trojan Types Under Cognitive Biases. Search on Bibsonomy CISS The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
29Amin Sarihi, Ahmad Patooghy, Peter Jamieson, Abdel-Hameed A. Badawy Trojan Playground: A Reinforcement Learning Framework for Hardware Trojan Insertion and Detection. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
29Vedika Saravanan, Mohammad Walid Charrwi, Samah Mohamed Saeed Revisiting Trojan Insertion Techniques for Post-Silicon Trojan Detection Evaluation. Search on Bibsonomy ISVLSI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
29Tatsuki Kurihara, Nozomu Togawa Hardware-Trojan Detection Based on the Structural Features of Trojan Circuits Using Random Forests. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
29Hassan Salmani, Mark M. Tehranipoor, Sarwono Sutikno, Fajar Wijitrisnanto Trust-Hub Trojan Benchmark for Hardware Trojan Detection Model Creation using Machine Learning. Search on Bibsonomy 2022   DOI  RDF
29Kento Hasegawa, Tomotaka Inoue, Nozomu Togawa A Two-Stage Hardware Trojan Detection Method Considering the Trojan Probability of Neighbor Nets. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
29Jiaji He, Haocheng Ma, Yanjiang Liu, Yiqiang Zhao Golden Chip-Free Trojan Detection Leveraging Trojan Trigger's Side-Channel Fingerprinting. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
29Swastik Brahma, Satyaki Nan, Laurent Njilla Strategic Hardware Trojan Testing with Hierarchical Trojan Types. Search on Bibsonomy CISS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
29Qiang Liu 0011, Pengyong Zhao, Fuqiang Chen A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
29Mohammad Nasim Imtiaz Khan, Asmit De, Swaroop Ghosh RF-Trojan: Leaking Kernel Data Using Register File Trojan. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
29Maik Ender, Pawel Swierczynski, Sebastian Wallat, Matthias Wilhelm 0002, Paul Martin Knopp, Christof Paar Insights into the Mind of a Trojan Designer: The Challenge to Integrate a Trojan into the Bitstream. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
29Maik Ender, Pawel Swierczynski, Sebastian Wallat, Matthias Wilhelm 0002, Paul Martin Knopp, Christof Paar Insights into the mind of a trojan designer: the challenge to integrate a trojan into the bitstream. Search on Bibsonomy ASP-DAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
29Kento Hasegawa, Masao Yanagisawa, Nozomu Togawa Trojan-Net Feature Extraction and Its Application to Hardware-Trojan Detection for Gate-Level Netlists Using Random Forest. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
29Kento Hasegawa, Masao Yanagisawa, Nozomu Togawa A Hardware-Trojan Classification Method Using Machine Learning at Gate-Level Netlists Based on Trojan Features. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
29Kento Hasegawa, Masao Yanagisawa, Nozomu Togawa Trojan-feature extraction at gate-level netlists and its application to hardware-Trojan detection using random forest classifier. Search on Bibsonomy ISCAS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
29Masaru Oya, Youhua Shi, Masao Yanagisawa, Nozomu Togawa In-situ Trojan authentication for invalidating hardware-Trojan functions. Search on Bibsonomy ISQED The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29K. Sudeendra Kumar, Rakesh Chanamala, Sauvagya Ranjan Sahoo, Kamala Kanta Mahapatra An improved AES Hardware Trojan benchmark to validate Trojan detection schemes in an ASIC design flow. Search on Bibsonomy VDAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
29Michael Muehlberghuber, Frank K. Gürkaynak, Thomas Korak, Philipp Dunst, Michael Hutter Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC. Search on Bibsonomy HASP@ISCA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
29Hassan Salmani, Mohammad Tehranipoor, Jim Plusquellic A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
29Hassan Salmani, Mohammad Tehranipoor, Jim Plusquellic New Design Strategy for Improving Hardware Trojan Detection and Reducing Trojan Activation Time. Search on Bibsonomy HOST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Quyen L. Nguyen, Arun Sood A Comparison of Intrusion-Tolerant System Architectures. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF D.0 General, D.2.4.d Formal methods, D.4.6.a Access controls, D.4.6.b Authentication, K.4.4.f Security, K.4.4.g Internet security policies, K.6.5.a Authentication, K.6.5.c Invasive software (viruses, worms, Trojan horses), K.6.5.e Unauthorized access (hacking, phreaking), K.6.m.b Security, C.4.f Reliability, D.2.9.m Risk management, D.4.5.e High availability, D.4.6.d Information flow controls, Data exfiltration, Intrusion Tolerance, availability and serviceability
22Mohammad Tehranipoor, Farinaz Koushanfar Guest Editors' Introduction: Confronting the Hardware Trustworthiness Problem. Search on Bibsonomy IEEE Des. Test Comput. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF hardware Trojans, Trojan attack, design and test, security measures, secret key, IP protection
22Yier Jin, Yiorgos Makris Hardware Trojans in Wireless Cryptographic ICs. Search on Bibsonomy IEEE Des. Test Comput. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF hardware Trojan, wireless cryptographic IC, statistical analysis, design and test
22Michael Nelson 0002, Ani Nahapetian, Farinaz Koushanfar, Miodrag Potkonjak SVD-Based Ghost Circuitry Detection. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hardware Trojan horses, gate characterization, singular value decomposition, manufacturing variability
22Xuxian Jiang, Florian P. Buchholz, Aaron Walters, Dongyan Xu, Yi-Min Wang, Eugene H. Spafford Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF (viruses, worms, Trojan horses), Servers, Security and Protection
22Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi Modeling and Automated Containment of Worms. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF (viruses, worms, Trojan horses), (Internet scanning worms), (stochastic worm modeling), (branching process model), (preference scanning worms), (automatic worm containment)
22Pierangela Samarati, Elisa Bertino, Alessandro Ciampichetti, Sushil Jajodia Information Flow Control in Object-Oriented Systems. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Object-oriented databases and systems, Trojan horse, security, distributed processing, mandatory access control, discretionary access control
14N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar Can we certify systems for freedom from malware. Search on Bibsonomy ICSE (2) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
14Vinod P. Nair, Vijay Laxmi, Manoj Singh Gaur, G. V. S. S. Phani Kumar, Yadvendra S. Chundawat Static CFG analyzer for metamorphic Malware code. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF metamorphic malware, normalization, obfuscation, control flow graph, longest common subsequence
14S. Momina Tabish, M. Zubair Shafiq, Muddassar Farooq Malware detection using statistical analysis of byte-level file content. Search on Bibsonomy KDD Workshop on CyberSecurity and Intelligence Informatics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF computer malware, data mining, forensics
14Federica Paci, Ning Shang, Sam Kerr, Kevin Steuer Jr., Jungha Woo, Elisa Bertino Privacy-preserving management of transactions' receipts for mobile environments. Search on Bibsonomy IDtrust The full citation details ... 2009 DBLP  DOI  BibTeX  RDF registrar, transaction record, privacy
14Asia Slowinska, Herbert Bos Pointless tainting?: evaluating the practicality of pointer tainting. Search on Bibsonomy EuroSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dynamic taint analysis, pointer tainting
14George Lawton Is It Finally Time to Worry about Mobile Malware? Search on Bibsonomy Computer The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1165 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license