Login / Signup
Pre-processing power traces to defeat random clocking countermeasures.
Philip Hodgers
Neil Hanley
Máire O'Neill
Published in:
ISCAS (2015)
Keyphrases
</>
countermeasures
preprocessing
information security
power analysis
power consumption
rural areas
feature extraction
post processing
cyber attacks
data mining
technological innovation
security measures
database
traffic accidents
java card
security breaches