Login / Signup
An efficient modeling attack for breaking the security of XOR-Arbiter PUFs by using the fully connected and long-short term memory.
Sina Soleimani Fard
Masoud Kaveh
Mohammad Reza Mosavi
Seok-Bum Ko
Published in:
Microprocess. Microsystems (2022)
Keyphrases
</>
fully connected
recurrent neural networks
information security
countermeasures
security measures
cyber attacks
long short term memory
intrusion detection
image processing
artificial neural networks
social network analysis
scale free