Статті в журналах з теми "Trojan Attack"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Trojan Attack".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Prathivi, Rastri, and Vensy Vydia. "ANALISA PENDETEKSIAN WORM dan TROJAN PADA JARINGAN INTERNET UNIVERSITAS SEMARANG MENGGUNAKAN METODE KALSIFIKASI PADA DATA MINING C45 dan BAYESIAN NETWORK." Jurnal Transformatika 14, no. 2 (January 30, 2017): 77. http://dx.doi.org/10.26623/transformatika.v14i2.440.
Повний текст джерелаJain, Ayush, Ziqi Zhou, and Ujjwal Guin. "TAAL." ACM Transactions on Design Automation of Electronic Systems 26, no. 4 (April 2021): 1–22. http://dx.doi.org/10.1145/3442379.
Повний текст джерелаYao, Jiaqi, Ying Zhang, and Chen Xin. "Network-on-Chip hardware Trojan detection platform based on machine learning." Journal of Physics: Conference Series 2189, no. 1 (February 1, 2022): 012004. http://dx.doi.org/10.1088/1742-6596/2189/1/012004.
Повний текст джерелаCheng, Siyuan, Yingqi Liu, Shiqing Ma, and Xiangyu Zhang. "Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 2 (May 18, 2021): 1148–56. http://dx.doi.org/10.1609/aaai.v35i2.16201.
Повний текст джерелаLu, Jiazhong, Xiaolei Liu, Shibin Zhang, and Yan Chang. "Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning." Security and Communication Networks 2020 (November 25, 2020): 1–13. http://dx.doi.org/10.1155/2020/6641844.
Повний текст джерелаJiang, Dong, Yongkai Yang, Qisheng Guang, Chaohui Gao, and Lijun Chen. "Eavesdropping on quantum secret sharing protocols based on ring topology." Quantum Information and Computation 19, no. 7&8 (June 2019): 587–600. http://dx.doi.org/10.26421/qic19.7-8-4.
Повний текст джерелаWang, Xinmu, Tamzidul Hoque, Abhishek Basak, Robert Karam, Wei Hu, Maoyuan Qin, Dejun Mu, and Swarup Bhunia. "Hardware Trojan Attack in Embedded Memory." ACM Journal on Emerging Technologies in Computing Systems 17, no. 1 (January 6, 2021): 1–28. http://dx.doi.org/10.1145/3422353.
Повний текст джерелаYu, Weize. "Hardware Trojan attacks on voltage scaling‐based side‐channel attack countermeasure." IET Circuits, Devices & Systems 13, no. 3 (March 19, 2019): 321–26. http://dx.doi.org/10.1049/iet-cds.2018.5087.
Повний текст джерелаIvanov, Andre. "A Look at Trojan Attack, Pruning, and Dependability." IEEE Design & Test 32, no. 2 (April 2015): 4–5. http://dx.doi.org/10.1109/mdat.2015.2405591.
Повний текст джерела于, 家涛. "Analysis of Trojan-Horse Attack against Untrusted Source." Computer Science and Application 08, no. 01 (2018): 59–66. http://dx.doi.org/10.12677/csa.2018.81009.
Повний текст джерелаMolotkov, S. N. "Unambiguous measurements and Trojan-horse attack in quantum cryptography." Laser Physics Letters 17, no. 1 (December 20, 2019): 015203. http://dx.doi.org/10.1088/1612-202x/ab5d25.
Повний текст джерелаMomin, Charles, Olivier Bronchain, and François-Xavier Standaert. "A stealthy Hardware Trojan based on a Statistical Fault Attack." Cryptography and Communications 13, no. 4 (March 13, 2021): 587–600. http://dx.doi.org/10.1007/s12095-021-00480-4.
Повний текст джерелаAprilliansyah, Deco, Imam Riadi, and Sunardi. "Analysis of Remote Access Trojan Attack using Android Debug Bridge." IJID (International Journal on Informatics for Development) 10, no. 2 (February 11, 2022): 102–11. http://dx.doi.org/10.14421/ijid.2021.2839.
Повний текст джерелаBi, Qiangjia, Ning Wu, Fang Zhou, Jinbao Zhang, Muhammad Rehan Yahya, and Fen Ge. "Fault attack hardware Trojan detection method based on ring oscillator." IEICE Electronics Express 16, no. 8 (2019): 20190143. http://dx.doi.org/10.1587/elex.16.20190143.
Повний текст джерелаBozdal, Mehmet, Maulana Randa, Mohammad Samie, and Ian Jennions. "Hardware Trojan Enabled Denial of Service Attack on CAN Bus." Procedia Manufacturing 16 (2018): 47–52. http://dx.doi.org/10.1016/j.promfg.2018.10.158.
Повний текст джерелаYang, Chun-Wei, and Tzonelih Hwang. "Trojan horse attack free fault-tolerant quantum key distribution protocols." Quantum Information Processing 13, no. 3 (November 30, 2013): 781–94. http://dx.doi.org/10.1007/s11128-013-0689-3.
Повний текст джерелаZhao, Fugang. "Naive Bayes Algorithm Mining Mobile Phone Trojan Crime Clues." Mobile Information Systems 2022 (August 26, 2022): 1–11. http://dx.doi.org/10.1155/2022/6262147.
Повний текст джерелаLi, Yufeng, Le Tian, Han Qiu, and Chuanhao Zhang. "Research Notes: Distributed Shadow for Router Security Defense." International Journal of Software Engineering and Knowledge Engineering 28, no. 02 (February 2018): 193–206. http://dx.doi.org/10.1142/s021819401840003x.
Повний текст джерелаPan, Yaxi, Ling Zhang, and Duan Huang. "Practical Security Bounds against Trojan Horse Attacks in Continuous-Variable Quantum Key Distribution." Applied Sciences 10, no. 21 (November 3, 2020): 7788. http://dx.doi.org/10.3390/app10217788.
Повний текст джерелаChen, Hao, Tao Wang, Fan Zhang, Xinjie Zhao, Wei He, Lumin Xu, and Yunfei Ma. "Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/8051728.
Повний текст джерелаTsai, Chia-Wei, and Chun-Wei Yang. "Lightweight authenticated semi-quantum key distribution protocol without trojan horse attack." Laser Physics Letters 17, no. 7 (June 22, 2020): 075202. http://dx.doi.org/10.1088/1612-202x/ab9444.
Повний текст джерелаYang, Daming, Cheng Gao, and Jiaoying Huang. "Dynamic Game for Strategy Selection in Hardware Trojan Attack and Defense." IEEE Access 8 (2020): 213094–103. http://dx.doi.org/10.1109/access.2020.3040395.
Повний текст джерелаSouza, Jaqueline Patrícia de Almeida. "FORTALEZAS E FRAGILIDADES NO USO DA INTELIGÊNCIA ARTIFICIAL NA CIBERSEGURANÇA." REVISTA TECNOLÓGICA DA FATEC AMERICANA 09, no. 02 (December 20, 2021): 25–40. http://dx.doi.org/10.47283/244670492021090225.
Повний текст джерелаRenolafitri, Hendrini. "“An Analysis of Trojan Horse Affairs, Measuring the Impact of Hoax Produced by Anti-Muslim Government in the UK”." POLITEA 2, no. 2 (October 18, 2019): 127. http://dx.doi.org/10.21043/politea.v2i2.6329.
Повний текст джерелаHu, Zhanhao, Jun Zhu, Bo Zhang, and Xiaolin Hu. "Amplification trojan network: Attack deep neural networks by amplifying their inherent weakness." Neurocomputing 505 (September 2022): 142–53. http://dx.doi.org/10.1016/j.neucom.2022.07.018.
Повний текст джерелаZhao, Yiming, Xiaohang Wang, Yingtao Jiang, Liang Wang, Mei Yang, Amit Kumar Singh, and Terrence Mak. "On hardware-trojan-assisted power budgeting system attack targeting many core systems." Journal of Systems Architecture 109 (October 2020): 101757. http://dx.doi.org/10.1016/j.sysarc.2020.101757.
Повний текст джерелаBoraten, Travis, and Avinash Kodi. "Mitigation of Hardware Trojan based Denial-of-Service attack for secure NoCs." Journal of Parallel and Distributed Computing 111 (January 2018): 24–38. http://dx.doi.org/10.1016/j.jpdc.2017.06.014.
Повний текст джерелаKamarudin, Nur Khairani, Nur Nazifa Md Hasani, Rafiza Ruslan, Rashidah Ramle, Nurul Hidayah Ahmad Zukri, and Iman Hazwam Abd Halim. "Performance Analysis of Malware Attack." Journal of Computing Research and Innovation 3, no. 4 (November 18, 2018): 19–24. http://dx.doi.org/10.24191/jcrinn.v3i4.72.
Повний текст джерелаTaylor, O. E., P. S. Ezekiel, and V. T. Emmah. "A Mult-Task System for Detecting and Classifying Malware Signatures Using Random Forest Classifier." Advances in Multidisciplinary and scientific Research Journal Publication 29 (December 15, 2021): 73–84. http://dx.doi.org/10.22624/aims/abmic2021-v2-p6.
Повний текст джерелаAbulkasim, Hussein, Safwat Hamad, Amal Khalifa, and Khalid El Bahnasy. "Quantum secret sharing with identity authentication based on Bell states." International Journal of Quantum Information 15, no. 04 (May 3, 2017): 1750023. http://dx.doi.org/10.1142/s021974991750023x.
Повний текст джерелаGovindan, Vidya, Rajat Subhra Chakraborty, Pranesh Santikellur, and Aditya Kumar Chaudhary. "A Hardware Trojan Attack on FPGA-Based Cryptographic Key Generation: Impact and Detection." Journal of Hardware and Systems Security 2, no. 3 (June 20, 2018): 225–39. http://dx.doi.org/10.1007/s41635-018-0042-5.
Повний текст джерелаChang, Chih-Hung, Chun-Wei Yang, and Tzonelih Hwang. "Trojan Horse Attack Free Fault-Tolerant Quantum Key Distribution Protocols Using GHZ States." International Journal of Theoretical Physics 55, no. 9 (April 30, 2016): 3993–4004. http://dx.doi.org/10.1007/s10773-016-3028-5.
Повний текст джерелаTsai, Chia-Wei, Chun-Wei Yang, and Narn-Yih Lee. "Lightweight mediated semi-quantum key distribution protocol." Modern Physics Letters A 34, no. 34 (November 5, 2019): 1950281. http://dx.doi.org/10.1142/s021773231950281x.
Повний текст джерелаKokila, Jagadeesh, Arjun Murali Das, Basha Shameedha Begum, and Natarajan Ramasubramanian. "Hardware Signature Generation Using a Hybrid PUF and FSM Model for an SoC Architecture." Periodica Polytechnica Electrical Engineering and Computer Science 63, no. 4 (June 14, 2019): 244–53. http://dx.doi.org/10.3311/ppee.13424.
Повний текст джерелаMa, Hong-Xin, Wan-Su Bao, Hong-Wei Li, and Chun Chou. "Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack." Chinese Physics B 25, no. 8 (July 26, 2016): 080309. http://dx.doi.org/10.1088/1674-1056/25/8/080309.
Повний текст джерелаKaji, Shugo, Masahiro Kinugawa, Daisuke Fujimoto, and Yu-ichi Hayashi. "Data Injection Attack Against Electronic Devices With Locally Weakened Immunity Using a Hardware Trojan." IEEE Transactions on Electromagnetic Compatibility 61, no. 4 (August 2019): 1115–21. http://dx.doi.org/10.1109/temc.2018.2849105.
Повний текст джерелаZhang, Yue, Xiangjun Xin, and Fagen Li. "Secure and efficient quantum designated verifier signature scheme." Modern Physics Letters A 35, no. 18 (May 13, 2020): 2050148. http://dx.doi.org/10.1142/s0217732320501485.
Повний текст джерелаWinick, Adam, Norbert Lütkenhaus, and Patrick J. Coles. "Reliable numerical key rates for quantum key distribution." Quantum 2 (July 26, 2018): 77. http://dx.doi.org/10.22331/q-2018-07-26-77.
Повний текст джерелаLeigh, Matthew. "Sophocles At Patavium (fr. 137 Radt)." Journal of Hellenic Studies 118 (November 1998): 82–100. http://dx.doi.org/10.2307/632232.
Повний текст джерелаAltoub, Majed, Fahad AlQurashi, Tan Yigitcanlar, Juan M. Corchado, and Rashid Mehmood. "An Ontological Knowledge Base of Poisoning Attacks on Deep Neural Networks." Applied Sciences 12, no. 21 (October 31, 2022): 11053. http://dx.doi.org/10.3390/app122111053.
Повний текст джерелаMelosik, Michal, and Wieslaw Marszalek. "Trojan Attack on the Initialization of Pseudo-Random Bit Generators Using Synchronization of Chaotic Input Sources." IEEE Access 9 (2021): 161846–53. http://dx.doi.org/10.1109/access.2021.3131969.
Повний текст джерелаWaliulu, Raditya Faisal, and Teguh Hidayat Iskandar Alam. "Reverse Engineering Analysis Statis Forensic Malware Webc2-Div." Insect (Informatics and Security): Jurnal Teknik Informatika 4, no. 1 (August 23, 2019): 15. http://dx.doi.org/10.33506/insect.v4i1.223.
Повний текст джерелаGao, Hui, Yunfang Chen, and Wei Zhang. "Detection of Trojaning Attack on Neural Networks via Cost of Sample Classification." Security and Communication Networks 2019 (November 29, 2019): 1–12. http://dx.doi.org/10.1155/2019/1953839.
Повний текст джерелаAmblard, Zoe, and Francois Arnault. "A qutrit quantum key distribution protocol using Bell inequalities with larger violation capabilities." Quantum Information and Computation 15, no. 15&16 (November 2015): 1295–306. http://dx.doi.org/10.26421/qic15.15-16-2.
Повний текст джерелаWarsino, Warsino. "Efek Pandemi Covid-19 Terhadap Kejahatan Siber di Indonesia." Tekinfo: Jurnal Ilmiah Teknik Industri dan Informasi 9, no. 1 (January 26, 2021): 27–33. http://dx.doi.org/10.31001/tekinfo.v9i1.1040.
Повний текст джерелаKashyap. S, Abishek. "Prevention of Clone Attack in Online Social Media Integrating Secure Data Transmission." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 2961–67. http://dx.doi.org/10.22214/ijraset.2021.35662.
Повний текст джерелаKakkara, Varsha, Karthi Balasubramanian, B. Yamuna, Deepak Mishra, Karthikeyan Lingasubramanian, and Senthil Murugan. "A Viterbi decoder and its hardware Trojan models: an FPGA-based implementation study." PeerJ Computer Science 6 (March 2, 2020): e250. http://dx.doi.org/10.7717/peerj-cs.250.
Повний текст джерелаNiess, Hanno, Michael N. Thomas, Tobias S. Schiergens, Axel Kleespies, Karl-Walter Jauch, Christiane Bruns, Jens Werner, Peter J. Nelson, and Martin K. Angele. "Genetic engineering of mesenchymal stromal cells for cancer therapy: turning partners in crime into Trojan horses." Innovative Surgical Sciences 1, no. 1 (September 1, 2016): 19–32. http://dx.doi.org/10.1515/iss-2016-0005.
Повний текст джерелаB, Manoj, and Fancy C. "Checksec Email Phishi Trasher Tool." International Journal of Engineering & Technology 7, no. 4.6 (September 25, 2018): 363. http://dx.doi.org/10.14419/ijet.v7i4.6.28442.
Повний текст джерелаChandy, Jeff. "Review on Malware, Types, and its Analysis." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 386–90. http://dx.doi.org/10.22214/ijraset.2022.47887.
Повний текст джерела