Data aggregation mechanisms in the Internet of things: A systematic review of the literature and recommendations for future research
B Pourghebleh, NJ Navimipour - Journal of Network and Computer …, 2017 - Elsevier
Abstract Internet of Things (IoT) as a new interesting subject in information technology
enables data receiving and sending for each creature through the communication network …
enables data receiving and sending for each creature through the communication network …
[HTML][HTML] Security in product lifecycle of IoT devices: A survey
Abstract The Internet of Things (IoT) paradigm is considerably impacted by security
challenges, which has lately demanded substantial consideration. Accordingly, certain …
challenges, which has lately demanded substantial consideration. Accordingly, certain …
Learn from your faults: leakage assessment in fault attacks using deep learning
Generic vulnerability assessment of cipher implementations against Fault Attacks (FA) is a
largely unexplored research area. Security assessment against FA is critical for FA …
largely unexplored research area. Security assessment against FA is critical for FA …
[HTML][HTML] Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAs
Field-programmable gate arrays (FPGAs) offer the inherent ability to reconfigure at runtime,
making them ideal for applications such as data centers, cloud computing, and edge …
making them ideal for applications such as data centers, cloud computing, and edge …
Systematic review of internet of things security
A Amiruddin, AAP Ratna… - International Journal of …, 2019 - search.proquest.com
Abstract The Internet of Things has become a new paradigm of current communications
technology that requires a deeper overview to map its application domains, advantages, and …
technology that requires a deeper overview to map its application domains, advantages, and …
Turning the table: Using bitstream reverse engineering to detect FPGA trojans
According to recent reports and surveys over the last 2 years, field-programmable gate
arrays (FPGAs) have increasingly become the prime targets for carrying out extremely …
arrays (FPGAs) have increasingly become the prime targets for carrying out extremely …
[HTML][HTML] Towards bidirectional LUT-level detection of hardware Trojans
FPGAs are field-programmable and reconfigurable integrated circuits; consequently, they
entail numerous security concerns. For example, malicious functions such as hardware …
entail numerous security concerns. For example, malicious functions such as hardware …
Flexible Updating of Internet of Things Computing Functions through Optimizing Dynamic Partial Reconfiguration
G Kornaros, S Leivadaros… - ACM Transactions on …, 2024 - dl.acm.org
With applications to become increasingly compute-and data-intensive, requiring more
processing power, many Internet of Things (IoT) platforms in robots, drones, and …
processing power, many Internet of Things (IoT) platforms in robots, drones, and …
Bio-inspired approaches to safety and security in iot-enabled cyber-physical systems
Internet of Things (IoT) and Cyber-Physical Systems (CPS) have profoundly influenced the
way individuals and enterprises interact with the world. Although attacks on IoT devices are …
way individuals and enterprises interact with the world. Although attacks on IoT devices are …
On the feasibility of using evolvable hardware for hardware Trojan detection and prevention
Evolvable hardware (EH) architectures are capable of changing their configuration and
behavior dynamically based on inputs from the environment. In this paper, we investigate …
behavior dynamically based on inputs from the environment. In this paper, we investigate …