Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection.
Hong ZhaoLuke KwiatKevin A. KwiatCharles A. KamhouaLaurent NjillaPublished in: IEEE Trans. Dependable Secur. Comput. (2020)
Keyphrases
- chaos theory
- real time
- detection accuracy
- detection algorithm
- hardware and software
- data acquisition
- monitoring system
- computer systems
- detection rate
- automatic detection
- face detection
- decision support
- object detection
- early warning
- false positives
- image processing
- hardware implementation
- neural network
- massively parallel
- vlsi implementation
- data sets