Wireless security techniques for coordinated manufacturing and on-line hardware trojan detection.
Sheng WeiMiodrag PotkonjakPublished in: WISEC (2012)
Keyphrases
- wireless communication
- hardware and software
- wireless networks
- random number generator
- cooperative
- low cost
- multi agent
- physical layer
- manufacturing systems
- detection rate
- detection algorithm
- intrusion detection
- access control
- false positives
- information security
- anomaly detection
- trusted computing
- real time
- detection method
- network security
- hardware implementation
- computer security
- cyber security
- malware detection
- mobile devices
- wireless local area network