Login / Signup
A Machine Learning-Based Security Vulnerability Study on XOR PUFs for Resource-Constraint Internet of Things.
Ahmad O. Aseeri
Yu Zhuang
Mohammed Saeed Alkatheiri
Published in:
ICIOT (2018)
Keyphrases
</>
machine learning
data mining
security issues
learning algorithm
artificial intelligence
text mining
machine learning methods
neural network
data analysis
information extraction
supervised learning
natural language processing
data management
access control
empirical studies
risk assessment