Towards Blockchain-enabled Mask Writing for Security against Hardware Trojan Intrusion.
Akshay KulkarniNoor Ahmad HazariMohammed Y. NiamatPublished in: eIT (2023)
Keyphrases
- intrusion detection
- network security
- cyber security
- intrusion detection and prevention
- intrusion detection system
- information security
- random number generator
- computer security
- anomaly detection
- malicious users
- denial of service attacks
- low cost
- hardware and software
- security policies
- real time
- computer systems
- national security
- access control
- security issues
- security requirements
- trusted computing
- massively parallel
- security threats
- computer networks
- digital images
- protection scheme
- key management
- security analysis
- critical infrastructure
- hardware architecture
- computing systems
- security level
- security measures
- network traffic
- protection schemes
- data mining