Enhancing Hardware Trojan Security through Reference-Free Clustering using Representatives.
Ashutosh GhimireMahommed AlkurdiFathi AmsaadPublished in: VLSID (2024)
Keyphrases
- real time
- clustering algorithm
- k means
- low cost
- clustering method
- hardware and software
- information security
- cluster analysis
- random number generator
- self organizing maps
- national security
- intrusion detection
- database systems
- trusted computing
- access control
- data clustering
- hierarchical clustering
- hardware implementation
- image processing
- security systems
- cyber security
- security issues
- categorical data
- computing systems
- computer security
- spectral clustering
- document clustering
- outlier detection
- security level
- operating system
- unsupervised learning
- windows xp