Gotowa bibliografia na temat „PUF Modeling”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „PUF Modeling”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "PUF Modeling"
Chattopadhyay, Saranyu, Pranesh Santikellur, Rajat Subhra Chakraborty, Jimson Mathew i Marco Ottavi. "A Conditionally Chaotic Physically Unclonable Function Design Framework with High Reliability". ACM Transactions on Design Automation of Electronic Systems 26, nr 6 (30.11.2021): 1–24. http://dx.doi.org/10.1145/3460004.
Pełny tekst źródłaNassar, Hassan, Lars Bauer i Jörg Henkel. "ANV-PUF: Machine-Learning-Resilient NVM-Based Arbiter PUF". ACM Transactions on Embedded Computing Systems 22, nr 5s (9.09.2023): 1–23. http://dx.doi.org/10.1145/3609388.
Pełny tekst źródłaKim, Tae-Yong, i Hoon-Jae Lee. "Electromagnetic Analysis to Design Unclonable PUF Modeling". Journal of the Korean Institute of Information and Communication Engineering 16, nr 6 (30.06.2012): 1141–47. http://dx.doi.org/10.6109/jkiice.2012.16.6.1141.
Pełny tekst źródłaCui, Yijun, Chongyan Gu, Qingqing Ma, Yue Fang, Chenghua Wang, Máire O’Neill i Weiqiang Liu. "Lightweight Modeling Attack-Resistant Multiplexer-Based Multi-PUF (MMPUF) Design on FPGA". Electronics 9, nr 5 (15.05.2020): 815. http://dx.doi.org/10.3390/electronics9050815.
Pełny tekst źródłaMispan, Mohd Syafiq, Aiman Zakwan Jidin, Haslinah Mohd Nasir, Noor Mohd Ariff Brahin i Illani Mohd Nawi. "Modeling arbiter-PUF in NodeMCU ESP8266 using artificial neural network". International Journal of Reconfigurable and Embedded Systems (IJRES) 11, nr 3 (1.11.2022): 233. http://dx.doi.org/10.11591/ijres.v11.i3.pp233-239.
Pełny tekst źródłaMispan, Mohd Syafiq, Mohammad Haziq Ishak, Aiman Zakwan Jidin i Haslinah Mohd Nasir. "FPGA implementation of artificial neural network for PUF modeling". International Journal of Reconfigurable and Embedded Systems (IJRES) 14, nr 1 (1.03.2025): 200. https://doi.org/10.11591/ijres.v14.i1.pp200-207.
Pełny tekst źródłaLalouani, Wassila, Mohamed Younis, Mohammad Ebrahimabadi i Naghmeh Karimi. "Countering Modeling Attacks in PUF-based IoT Security Solutions". ACM Journal on Emerging Technologies in Computing Systems 18, nr 3 (31.07.2022): 1–28. http://dx.doi.org/10.1145/3491221.
Pełny tekst źródłaMishra, Nimish, Kuheli Pratihar, Satota Mandal, Anirban Chakraborty, Ulrich Rührmair i Debdeep Mukhopadhyay. "CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, nr 1 (4.12.2023): 501–26. http://dx.doi.org/10.46586/tches.v2024.i1.501-526.
Pełny tekst źródłaRuhrmair, Ulrich, Jan Solter, Frank Sehnke, Xiaolin Xu, Ahmed Mahmoud, Vera Stoyanova, Gideon Dror, Jurgen Schmidhuber, Wayne Burleson i Srinivas Devadas. "PUF Modeling Attacks on Simulated and Silicon Data". IEEE Transactions on Information Forensics and Security 8, nr 11 (listopad 2013): 1876–91. http://dx.doi.org/10.1109/tifs.2013.2279798.
Pełny tekst źródłaAli-Pour, Amir, David Hely, Vincent Beroulle i Giorgio Di Natale. "Strong PUF Enrollment with Machine Learning: A Methodical Approach". Electronics 11, nr 4 (19.02.2022): 653. http://dx.doi.org/10.3390/electronics11040653.
Pełny tekst źródłaRozprawy doktorskie na temat "PUF Modeling"
Vinagrero, Gutierrez Sergio. "Méthodologies pour la Conception, la Modélisation et l'Évaluation de la Qualité des Fonctions Physiques Non Clonables (PUFs)". Electronic Thesis or Diss., Université Grenoble Alpes, 2024. http://www.theses.fr/2024GRALT063.
Pełny tekst źródłaPhysical Unclonable Functions (PUFs) are a promising alternative to conventional cryptographic methods for securing sensitive data in modern circuits by generating unique secrets on the fly, leveraging inherent process variability and eliminating the need for data storage. Ring Oscillator and SRAM-based PUFs are particularly studied due to their simplicity and prevalence in System-on-Chips (SOCs).During the parametric simulations for PUF evaluation, several limitations in available commercial Electronic Design Automation (EDA) software were identified. To address these challenges, a series of open-source tools were developed, such as Monaco and NIMPHEL, to simplify and accelerate the design process and evaluation through simulation methodologies.To validate the simulation results, an open-source platform, SRAMPlatform, was created to gather extensive SRAM data and sensor readings from microcontrollers. The platform gathers data from 84 STM32 microcontrollers, with weekly updates stored in an open-access database, addressing the scarcity of accessible PUF datasets. Additionally, a comprehensive dataset from Infineon provided valuable insights for validating simulation hypotheses and exploring new PUF designs.Furthermore, significant limitations in standard PUF performance metrics are noted and several mitigations and new alternative metrics for more robust evaluation are proposed. Real-world data from the SRAM platform showed extreme bias and correlation effects that the canonical metrics failed to highlight, underscoring the need for more robust testing methodologies to accurately identify these effects. A major focus was placed on the relationship between entropy and reliability in PUFs, leading to the development of a simulation-based methodology for setting reliability thresholds based on frequency differences. Subsequently, a holistic mathematical model accounting for process variability was created to optimize RO-PUF designs, and a new design methodology, "Split PUF," is introduced to maximize entropy yield and reliability.The mathematical modeling of PUFs, a less-explored area is also investigated, by proposing statistical and numerical methodologies to improve understanding of RO and SRAM-based PUF designs. Statistical methods for metric extrapolation are introduced, reducing the time and cost needed to evaluate PUFs. Furthermore, digital twins of PUFs are proposed, facilitating algorithm testing and evaluation. These models provide a robust and cost-effective methodology for assessing PUF performance and aid in their security assessment.These advancements enhance PUF assessment methodologies, addressing limitations in current tools and metrics, and providing new frameworks and models for future research. Future work includes developing a unified testing framework for all PUF families, validating statistical models across a wider spectrum of PUF families, refining the digital twin models, extending the concept of Split PUFs to new PUF families. These research directions aim to accelerate the worldwide adoption of PUF technologies by enhancing assessment methodologies, addressing current tool and metric limitations, and providing new frameworks and models for future research
Pundir, Nitin K. Pundir. "Design of a Hardware Security PUF Immune to Machine Learning Attacks". University of Toledo / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1513009797455883.
Pełny tekst źródłaHerkert, Nicholas John. "Development of the polyurethane foam passive air sampler for novel applications in ambient air across the globe". Diss., University of Iowa, 2018. https://ir.uiowa.edu/etd/6130.
Pełny tekst źródłaLemire, Garlic Nicole. "NLG Thesis Appendices Final 5 12 17.pdf". Master's thesis, Temple University Libraries, 2017. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/452949.
Pełny tekst źródłaM.A.
The analysis of mainstream newspaper content has long been mined by communication scholars and researchers for insights into public opinion and perceptions. In recent years, scholars have been examining African-American authored periodicals to obtain similar insights. Hearkening back to the 1950s and 1960s civil rights movement in the United States, the highly-publicized killings of African-American men by police officers during the past several years have highlighted longstanding strained police-community relations. As part of its role as both a reflection of, and an advocate for, the African-American community, African-American journalistic texts contain a wealth of data about African-American public opinion about, and perceptions of, police. In years past, media content analysts would manually sift through newspapers to divine interesting police-related themes and variables worthy of study. But, with the exponential growth of digitized texts, communication scholars are experimenting with computerized text analysis tools like topic modeling software to aid them in their content analyses. This thesis considers to what degree topic modeling software can be used at the exploratory stage of designing a content analysis study to aid in uncovering themes and variables worthy of further investigation. Appendix A contains results of the manual exploratory content analysis. The list of topics generated by the topic modeling software may be found in Appendix B.
Temple University--Theses
Bakosi, József. "PDF modeling of turbulent flows on unstructured grids". Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3083.
Pełny tekst źródłaVita: p. 178. Thesis director: Zafer Boybeyi. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computational Sciences and Informatics. Title from PDF t.p. (viewed June 30, 2008). Includes bibliographical references (p. 168-177). Also issued in print.
Matheson, Tomas. "Presumed pdf modelling for turbulent spray combustion". Thesis, University of Southampton, 2016. https://eprints.soton.ac.uk/413770/.
Pełny tekst źródłaZhu, Min. "Modelling and simulation of spray combustion with PDF methods". Thesis, University of Cambridge, 1996. https://www.repository.cam.ac.uk/handle/1810/272496.
Pełny tekst źródłaKhan, Md Kaisar. "NUMERICAL MODELING OF WAVE PROPAGATION IN NONLINEAR PHOTONIC CRYSTAL FIBER". Doctoral diss., University of Central Florida, 2008. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4096.
Pełny tekst źródłaPh.D.
School of Electrical Engineering and Computer Science
Engineering and Computer Science
Electrical Engineering PhD
De, Vito D. Timothy James. "Modeling aerosol puff concentration distributions from point sources using artificial neural networks". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0030/MQ65852.pdf.
Pełny tekst źródłaDe, Vito D. Timothy James. "Modeling aerosol puff concentration distributions from point sources using artificial neural networks". Ottawa : National Library of Canada = Bibliothèque nationale du Canada, 2002. http://www.nlc-bnc.ca/obj/s4/f2/dsk1/tape3/PQDD%5F0030/MQ65852.pdf.
Pełny tekst źródłaKsiążki na temat "PUF Modeling"
Wisiol, Nils. Modeling Attack Security of Physical Unclonable Functions based on Arbiter PUFs. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-29207-1.
Pełny tekst źródłaObieglo, Andreas. PDF modeling of H₂ and CH₄ chemistry in turbulent nonpremixed combustion. 2000.
Znajdź pełny tekst źródłaWisiol, Nils. Modeling Attack Security of Physical Unclonable Functions Based on Arbiter PUFs. Springer International Publishing AG, 2024.
Znajdź pełny tekst źródłaWisiol, Nils. Modeling Attack Security of Physical Unclonable Functions Based on Arbiter PUFs. Springer International Publishing AG, 2023.
Znajdź pełny tekst źródłaKulvicki, John. Modeling the Meanings of Pictures. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198847472.001.0001.
Pełny tekst źródłaComparison of PDF and moment closure methods in the modeling of turbulent reacting flows. Cleveland, Ohio: National Aeronautics and Space Administration, Lewis Research Center, Institute for Computational Mechanics in Propulsion, 1994.
Znajdź pełny tekst źródłaComparison of PDF and moment closure methods in the modeling of turbulent reacting flows. Cleveland, Ohio: National Aeronautics and Space Administration, Lewis Research Center, Institute for Computational Mechanics in Propulsion, 1994.
Znajdź pełny tekst źródłaFerreira, Marco, Adelmo Bertoldey i Scott Holan. Bayesian modelling of train door reliability. Redaktorzy Anthony O'Hagan i Mike West. Oxford University Press, 2018. http://dx.doi.org/10.1093/oxfordhb/9780198703174.013.11.
Pełny tekst źródłaLenhard, Johannes. Computation and Simulation. Redaktor Robert Frodeman. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780198733522.013.36.
Pełny tekst źródłaKing, Ruth. Morphosyntactic Variation. Redaktorzy Robert Bayley, Richard Cameron i Ceil Lucas. Oxford University Press, 2013. http://dx.doi.org/10.1093/oxfordhb/9780199744084.013.0022.
Pełny tekst źródłaCzęści książek na temat "PUF Modeling"
Santikellur, Pranesh, i Rajat Subhra Chakraborty. "Modeling Attacks on PUF". W Deep Learning for Computational Problems in Hardware Security, 35–53. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-4017-0_4.
Pełny tekst źródłaRaja Adhithan, R., i N. Nalla Anandakumar. "Modeling Attacks and Efficient Countermeasures on Interpose PUF". W Foundations and Practice of Security, 149–62. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70881-8_10.
Pełny tekst źródłaRamnath, Vishalini Laguduva, Sathyanarayanan N. Aakur i Srinivas Katkoori. "Latent Space Modeling for Cloning Encrypted PUF-Based Authentication". W IFIP Advances in Information and Communication Technology, 142–58. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43605-6_9.
Pełny tekst źródłaNozaki, Yusuke, i Masaya Yoshikawa. "Security Evaluation of Ring Oscillator PUF Against Genetic Algorithm Based Modeling Attack". W Innovative Mobile and Internet Services in Ubiquitous Computing, 338–47. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22263-5_33.
Pełny tekst źródłaTirabassi, T., S. Malta, U. Rizza i C. Mangia. "A Skewed Puff Model". W Air Pollution Modeling and Its Application XIII, 437–45. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4153-0_45.
Pełny tekst źródłaArbab, Farhad. "Puff, The Magic Protocol". W Formal Modeling: Actors, Open Systems, Biological Systems, 169–206. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24933-4_9.
Pełny tekst źródłaGerlinger, Peter, i Manfred Aigner. "Assumed PDF Modeling with Detailed Chemistry". W High Performance Computing in Science and Engineering ’01, 317–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-642-56034-7_31.
Pełny tekst źródłaBornstein, R., Z. Boybeyi i F. Ludwig. "Development of the Adaptive Volume Puff Model". W Air Pollution Modeling and Its Application VIII, 733–39. Boston, MA: Springer US, 1991. http://dx.doi.org/10.1007/978-1-4615-3720-5_85.
Pełny tekst źródłaRéveillon, J., i L. Vervisch. "Dynamic Subgrid Pdf Modeling for Nonpremixed Turbulent Combustion". W Direct and Large-Eddy Simulation II, 311–20. Dordrecht: Springer Netherlands, 1997. http://dx.doi.org/10.1007/978-94-011-5624-0_29.
Pełny tekst źródłaAnand, Gaurav, i Patrick Jenny. "PDF modeling of vapour micromixing in turbulent evaporating sprays". W Springer Proceedings in Physics, 497–99. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03085-7_119.
Pełny tekst źródłaStreszczenia konferencji na temat "PUF Modeling"
Bhatta, Niraj Prasad, i Fathi Amsaad. "Advancing PUF Security Machine Learning Assisted Modeling Attacks". W 2024 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 805–8. IEEE, 2024. http://dx.doi.org/10.1109/isvlsi61997.2024.00159.
Pełny tekst źródłaAlahmadi, Sara, Kasem Khalil i Magdy Bayoumi. "Enhancing Arbiter PUF Against Modeling Attacks Using Constant Weight Encoding". W 2024 IEEE 67th International Midwest Symposium on Circuits and Systems (MWSCAS), 173–77. IEEE, 2024. http://dx.doi.org/10.1109/mwscas60917.2024.10658746.
Pełny tekst źródłaBian, Jingchang, Zhengfeng Huang, Ruixiang Liu, Yankun Lin, Zhao Yang, Huaguo Liang i Aibin Yan. "A RO-Integrated-LFSR-Based Nonlinear Strong PUF with Intrinsic Modeling Attacks Resilience". W 2024 IEEE International Test Conference in Asia (ITC-Asia), 1–6. IEEE, 2024. http://dx.doi.org/10.1109/itc-asia62534.2024.10661346.
Pełny tekst źródłaAparicio-Téllez, Raúl, Miguel Garcia-Bosque, Guillermo Díez-Señorans i Santiago Celma. "Towards the Implementation of a Strong PUF using Generalized Galois Ring Oscillators". W 2024 20th International Conference on Synthesis, Modeling, Analysis and Simulation Methods and Applications to Circuit Design (SMACD), 1–4. IEEE, 2024. http://dx.doi.org/10.1109/smacd61181.2024.10745403.
Pełny tekst źródłaAparicio-Téllez, Raúl, Miguel Garcia-Bosque, Guillermo Díez-Señorans, Abel Naya i Santiago Celma. "Proposal and Implementation on Smartphone of a PUF Using Accelerometers and Gyroscopes". W 2024 20th International Conference on Synthesis, Modeling, Analysis and Simulation Methods and Applications to Circuit Design (SMACD), 1–4. IEEE, 2024. http://dx.doi.org/10.1109/smacd61181.2024.10745425.
Pełny tekst źródłaZhou, Shengjie, Yongliang Chen, Xiaole Cui i Yun Liu. "Modeling Attack Tests and Security Enhancement of the Sub-Threshold Voltage Divider Array PUF". W 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1–6. IEEE, 2024. http://dx.doi.org/10.23919/date58400.2024.10546728.
Pełny tekst źródłaFazel, Iman Alavi, i Gabriel Wainer. "Brooks-Iyengar Algorithm in pub/sub Architecture Using the DEVS Formalism". W 2024 Annual Modeling and Simulation Conference (ANNSIM), 1–12. IEEE, 2024. http://dx.doi.org/10.23919/annsim61499.2024.10732112.
Pełny tekst źródłaWen, Yuejiang, i Yingjie Lao. "PUF Modeling Attack using Active Learning". W 2018 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, 2018. http://dx.doi.org/10.1109/iscas.2018.8351302.
Pełny tekst źródłaNozaki, Yusuke, Kensaku Asahi i Masaya Yoshikawa. "PUF ID generation method for modeling attacks". W 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE). IEEE, 2014. http://dx.doi.org/10.1109/gcce.2014.7031149.
Pełny tekst źródłaRuhrmair, Ulrich, i Jan Solter. "PUF modeling attacks: An introduction and overview". W Design Automation and Test in Europe. New Jersey: IEEE Conference Publications, 2014. http://dx.doi.org/10.7873/date2014.361.
Pełny tekst źródłaRaporty organizacyjne na temat "PUF Modeling"
Pope, Stephen B. PDF Modelling of Turbulent Combustion. Fort Belvoir, VA: Defense Technical Information Center, sierpień 2005. http://dx.doi.org/10.21236/ada452252.
Pełny tekst źródłaPope, Stephen B. PDF Modelling of Turbulent Combustion. Fort Belvoir, VA: Defense Technical Information Center, lipiec 2000. http://dx.doi.org/10.21236/ada379844.
Pełny tekst źródłaRoderick, N. F., S. S. Payne i J. Nicholson. Magnetohydrodynamic modeling of plasma opening switches and gas puff plasmas. Office of Scientific and Technical Information (OSTI), listopad 1989. http://dx.doi.org/10.2172/7264657.
Pełny tekst źródłaLong, Kevin, i Craig Hamel. Stabilized Hyperfoam Modeling of the General Plastics EF4003 (3 PCF) Flexible Foam. Office of Scientific and Technical Information (OSTI), czerwiec 2022. http://dx.doi.org/10.2172/1870771.
Pełny tekst źródłaHadley, Isabel. PR164-205102-R01 Application of Probabilistic Fracture Mechanics to Engineering Critical Assessment. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), kwiecień 2021. http://dx.doi.org/10.55274/r0012093.
Pełny tekst źródłaKesler, Dylan, Conor McGowan i Mark Ryan. Endangered Species Management (Ukrainian). American Museum of Natural History, 2015. http://dx.doi.org/10.5531/cbc.ncep.0112.
Pełny tekst źródłaKeeney, Roman, i Thomas Hertel. GTAP-AGR: A Framework for Assessing the Implications of Multilateral Changes in Agricultural Policies. GTAP Technical Paper, sierpień 2005. http://dx.doi.org/10.21642/gtap.tp24.
Pełny tekst źródłaMalcolm, Gerard. Modeling Country Risk and Capital Flows in GTAP. GTAP Technical Paper, wrzesień 2000. http://dx.doi.org/10.21642/gtap.tp13.
Pełny tekst źródłaWolfer, W. G., M. Caturla, A. Kubota, A. Quong, B. Sadigh, P. Sterne, M. Surh, C. Schaldach i B. Wirth. Progress in Modeling Pu Properties and Aging - ESC Review, March 19-23, 2001. Office of Scientific and Technical Information (OSTI), marzec 2001. http://dx.doi.org/10.2172/15005124.
Pełny tekst źródłaHuang, Tao, i Venkatesh Merwade. Developing Customized NRCS Unit Hydrographs (Finley UHs) for Ungauged Watersheds in Indiana. Purdue University, 2023. http://dx.doi.org/10.5703/1288284317644.
Pełny tekst źródła