These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
109 related articles for article (PubMed ID: 32927772)
1. Hardware Trojans in Chips: A Survey for Detection and Prevention. Dong C; Xu Y; Liu X; Zhang F; He G; Chen Y Sensors (Basel); 2020 Sep; 20(18):. PubMed ID: 32927772 [TBL] [Abstract][Full Text] [Related]
2. System-level protection and hardware Trojan detection using weighted voting. Amin HA; Alkabani Y; Selim GM J Adv Res; 2014 Jul; 5(4):499-505. PubMed ID: 25685518 [TBL] [Abstract][Full Text] [Related]
3. Hardware Trojans based on two-dimensional memtransistors. Wali A; Ravichandran H; Das S Nanoscale Horiz; 2023 May; 8(5):603-615. PubMed ID: 37021644 [TBL] [Abstract][Full Text] [Related]
4. Hardware Trojan Mitigation Technique in Network-on-Chip (NoC). Hussain M; Baloach NK; Ali G; ElAffendi M; Dhaou IB; Ullah SS; Uddin M Micromachines (Basel); 2023 Apr; 14(4):. PubMed ID: 37421062 [TBL] [Abstract][Full Text] [Related]
5. A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection. Dong C; Yao Y; Xu Y; Liu X; Wang Y; Zhang H; Xu L Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420671 [TBL] [Abstract][Full Text] [Related]
6. A Siamese deep learning framework for efficient hardware Trojan detection using power side-channel data. Nasr A; Mohamed K; Elshenawy A; Zaki M Sci Rep; 2024 Jun; 14(1):13013. PubMed ID: 38844523 [TBL] [Abstract][Full Text] [Related]
7. A Viterbi decoder and its hardware Trojan models: an FPGA-based implementation study. Kakkara V; Balasubramanian K; Yamuna B; Mishra D; Lingasubramanian K; Murugan S PeerJ Comput Sci; 2020; 6():e250. PubMed ID: 33816902 [TBL] [Abstract][Full Text] [Related]
8. Hardware Trojan Attacks on the Reconfigurable Interconnections of Field-Programmable Gate Array-Based Convolutional Neural Network Accelerators and a Physically Unclonable Function-Based Countermeasure Detection Technique. Hou J; Liu Z; Yang Z; Yang C Micromachines (Basel); 2024 Jan; 15(1):. PubMed ID: 38276848 [TBL] [Abstract][Full Text] [Related]
9. Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs. Ali L; Farshad PLoS One; 2021; 16(7):e0254903. PubMed ID: 34324521 [TBL] [Abstract][Full Text] [Related]
10. Efficient design and analysis of secure CMOS logic through logic encryption. Chandra SS; Kannan RJ; Balaji BS; Veeramachaneni S; Noor Mahammad S Sci Rep; 2023 Jan; 13(1):1145. PubMed ID: 36670188 [TBL] [Abstract][Full Text] [Related]
11. Neuromorphic hardware databases for exploring structure-function relationships in the brain. Breslin C; O'Lenskie A Philos Trans R Soc Lond B Biol Sci; 2001 Aug; 356(1412):1249-58. PubMed ID: 11545701 [TBL] [Abstract][Full Text] [Related]
12. Malicious Activity Detection in Lightweight Wearable and IoT Devices Using Signal Stitching. Karabacak F; Ogras U; Ozev S Sensors (Basel); 2021 May; 21(10):. PubMed ID: 34068359 [TBL] [Abstract][Full Text] [Related]
13. A survey on attack detection, estimation and control of industrial cyber-physical systems. Zhang D; Wang QG; Feng G; Shi Y; Vasilakos AV ISA Trans; 2021 Oct; 116():1-16. PubMed ID: 33581894 [TBL] [Abstract][Full Text] [Related]
14. Research about DoS Attack against ICPS. Gao J; Chai S; Zhang B; Xia Y Sensors (Basel); 2019 Mar; 19(7):. PubMed ID: 30934966 [TBL] [Abstract][Full Text] [Related]
15. A dual mode self-test for a stand alone AES core. Hossain FS; Sakib TH; Ashar M; Ferdian R PLoS One; 2021; 16(12):e0261431. PubMed ID: 34941912 [TBL] [Abstract][Full Text] [Related]
16. Cyber-physical systems security: Limitations, issues and future trends. Yaacoub JA; Salman O; Noura HN; Kaaniche N; Chehab A; Malli M Microprocess Microsyst; 2020 Sep; 77():103201. PubMed ID: 32834204 [TBL] [Abstract][Full Text] [Related]
17. Secure Electronics Enabled by Atomically Thin and Photosensitive Two-Dimensional Memtransistors. Oberoi A; Dodda A; Liu H; Terrones M; Das S ACS Nano; 2021 Dec; 15(12):19815-19827. PubMed ID: 34914350 [TBL] [Abstract][Full Text] [Related]
18. Design Space Exploration of Hardware Spiking Neurons for Embedded Artificial Intelligence. Abderrahmane N; Lemaire E; Miramond B Neural Netw; 2020 Jan; 121():366-386. PubMed ID: 31593842 [TBL] [Abstract][Full Text] [Related]