Embracing Graph Neural Networks for Hardware Security.
Lilas AlrahisSatwik PatnaikMuhammad ShafiqueOzgur SinanogluPublished in: ICCAD (2022)
Keyphrases
- neural network
- hardware and software
- random number generator
- access control
- graph model
- artificial neural networks
- security requirements
- information security
- neural network model
- graph theory
- security issues
- security policies
- low cost
- pattern recognition
- intrusion detection
- random walk
- directed graph
- real time
- graph structure
- protection scheme
- graph matching
- security mechanisms
- genetic algorithm
- windows xp
- statistical databases
- graph representation
- computer security
- trusted computing
- graph mining
- hardware implementation
- bipartite graph
- network security
- recurrent neural networks
- data acquisition
- self organizing maps
- spanning tree
- directed acyclic graph
- feed forward
- cyber security
- fault diagnosis
- computer systems