Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)
<div><p>Due to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical. Over the years, many methods have been proposed to detect and mitigate these HTs in...
Saved in:
| Main Author: | Musharraf Hussain (17541498) (author) |
|---|---|
| Other Authors: | Naveed Khan Baloach (17541501) (author), Gauhar Ali (7300334) (author), Mohammed ElAffendi (17020390) (author), Imed Ben Dhaou (17541504) (author), Syed Sajid Ullah (17541507) (author), Mueen Uddin (4903510) (author) |
| Published: |
2023
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A dual-stage deep learning approach for robust detection and identification of hardware trojans using monte-carlo dropout
by: Arash Golabi (21841484)
Published: (2025) -
Efficient techniques for testing networks on chips. (c2010)
by: Abou Eid, Nancy
Published: (2010) -
Cyber-risk Mitigation Strategies and the Role of Artificial Intelligence in Mitigating Cyber-Risks: The Case of the United Arab Emirates Transport Sector
by: ALYAMMAHI, ALI SAEED ALI AHMED
Published: (2025) -
Mitigation strategies against the phishing attacks: A systematic literature review
by: Bilal Naqvi (19450327)
Published: (2023) -
A Review on Membrane Biofouling: Prediction, Characterization, and Mitigation
by: AlSawaftah, Nour Majdi
Published: (2022)