Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jhss/jhss5.bht:"
@article{DBLP:journals/jhss/AbbasiJBTD21, author = {Hossein Abbasi and Naser Ezzati{-}Jivan and Martine Bella{\"{\i}}che and Chamseddine Talhi and Michel R. Dagenais}, title = {The Use of Anomaly Detection for the Detection of Different Types of DDoS Attacks in Cloud Environment}, journal = {J. Hardw. Syst. Secur.}, volume = {5}, number = {3}, pages = {208--222}, year = {2021}, url = {https://doi.org/10.1007/s41635-021-00119-z}, doi = {10.1007/S41635-021-00119-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/AbbasiJBTD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/DaneshBR21, author = {Wafi Danesh and Joshua Banago and Mostafizur Rahman}, title = {Turning the Table: Using Bitstream Reverse Engineering to Detect {FPGA} Trojans}, journal = {J. Hardw. Syst. Secur.}, volume = {5}, number = {3}, pages = {237--246}, year = {2021}, url = {https://doi.org/10.1007/s41635-021-00122-4}, doi = {10.1007/S41635-021-00122-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/DaneshBR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/DasSMDC21, author = {Bijoy Das and Amit Sardar and Swapan Maiti and Abhijit Das and Dipanwita Roy Chowdhury}, title = {An Attack on Linear Scan Chains for Stream Ciphers and the Impossibility of Simple Countermeasures}, journal = {J. Hardw. Syst. Secur.}, volume = {5}, number = {3}, pages = {191--207}, year = {2021}, url = {https://doi.org/10.1007/s41635-021-00118-0}, doi = {10.1007/S41635-021-00118-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/DasSMDC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/HuangZSZLG21, author = {Zenan Huang and Xiao Zhang and Jiebin Su and Zhixin Zhou and Hongyin Luo and Donghui Guo}, title = {Reconfigurable {TPM} Implemented with Ultralow-Power Management in 28nm {CMOS} Process for IoT SoC Design}, journal = {J. Hardw. Syst. Secur.}, volume = {5}, number = {1}, pages = {32--44}, year = {2021}, url = {https://doi.org/10.1007/s41635-020-00109-7}, doi = {10.1007/S41635-020-00109-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/HuangZSZLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/JorgensenWPZ21, author = {Erik J. Jorgensen and Frank T. Werner and Milos Prvulovic and Alenka G. Zajic}, title = {Deep Learning Classification of Motherboard Components by Leveraging {EM} Side-Channel Signals}, journal = {J. Hardw. Syst. Secur.}, volume = {5}, number = {2}, pages = {114--126}, year = {2021}, url = {https://doi.org/10.1007/s41635-021-00116-2}, doi = {10.1007/S41635-021-00116-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/JorgensenWPZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/KaurD21, author = {Jaspinder Kaur and Shirshendu Das}, title = {A Survey on Cache Timing Channel Attacks for Multicore Processors}, journal = {J. Hardw. Syst. Secur.}, volume = {5}, number = {2}, pages = {169--189}, year = {2021}, url = {https://doi.org/10.1007/s41635-021-00115-3}, doi = {10.1007/S41635-021-00115-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/KaurD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/LavaudGGBNM21, author = {Corentin Lavaud and Robin Gerzaguet and Matthieu Gautier and Olivier Berder and Erwan Nogues and St{\'{e}}phane Molton}, title = {Whispering Devices: {A} Survey on How Side-channels Lead to Compromised Information}, journal = {J. Hardw. Syst. Secur.}, volume = {5}, number = {2}, pages = {143--168}, year = {2021}, url = {https://doi.org/10.1007/s41635-021-00112-6}, doi = {10.1007/S41635-021-00112-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/LavaudGGBNM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/LiuCSRL21, author = {Bozhi Liu and Kemeng Chen and Minjun Seo and Janet Meiling Roveda and Roman Lysecky}, title = {Methods and Analysis of Automated Trace Alignment Under Power Obfuscation in Side Channel Attacks}, journal = {J. Hardw. Syst. Secur.}, volume = {5}, number = {2}, pages = {127--142}, year = {2021}, url = {https://doi.org/10.1007/s41635-021-00117-1}, doi = {10.1007/S41635-021-00117-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/LiuCSRL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/NicholasSJWS21, author = {Geraldine Shirley Nicholas and Ali Shuja Siddiqui and Sam Reji Joseph and Gregory Williams and Fareena Saqib}, title = {A Secure Boot Framework with Multi-security Features and Logic-Locking Applications for Reconfigurable Logic}, journal = {J. Hardw. Syst. Secur.}, volume = {5}, number = {3}, pages = {260--268}, year = {2021}, url = {https://doi.org/10.1007/s41635-021-00123-3}, doi = {10.1007/S41635-021-00123-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/NicholasSJWS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/PhillipsAS21, author = {Prudence Phillips and Olaide R. Afolabi and Hassan Salmani}, title = {Experimental Data Anomaly Detection at Edge Sensor Nodes Using Physics Laws}, journal = {J. Hardw. Syst. Secur.}, volume = {5}, number = {1}, pages = {19--31}, year = {2021}, url = {https://doi.org/10.1007/s41635-020-00101-1}, doi = {10.1007/S41635-020-00101-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/PhillipsAS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/PottJCES21, author = {Claudius Pott and Philipp Jungklass and David Jacek Csejka and Thomas Eisenbarth and Marco Siebert}, title = {Firmware Security Module}, journal = {J. Hardw. Syst. Secur.}, volume = {5}, number = {2}, pages = {103--113}, year = {2021}, url = {https://doi.org/10.1007/s41635-021-00114-4}, doi = {10.1007/S41635-021-00114-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/PottJCES21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/RaiTM21, author = {Vikash Kumar Rai and Somanath Tripathy and Jimson Mathew}, title = {Design and Analysis of Reconfigurable Cryptographic Primitives: {TRNG} and {PUF}}, journal = {J. Hardw. Syst. Secur.}, volume = {5}, number = {3}, pages = {247--259}, year = {2021}, url = {https://doi.org/10.1007/s41635-021-00120-6}, doi = {10.1007/S41635-021-00120-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/RaiTM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/RajamanikkamSRC21, author = {Chidhambaranathan Rajamanikkam and Rajesh J. S. and Sanghamitra Roy and Koushik Chakraborty}, title = {Understanding Security Threats in Emerging Neuromorphic Computing Architecture}, journal = {J. Hardw. Syst. Secur.}, volume = {5}, number = {1}, pages = {45--57}, year = {2021}, url = {https://doi.org/10.1007/s41635-021-00110-8}, doi = {10.1007/S41635-021-00110-8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jhss/RajamanikkamSRC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/RoyD21, author = {Dibyendu Roy and Deepak Kumar Dalai}, title = {An Observation of Non-randomness in NFSR-Based Stream Ciphers with Reduced Initialization Round}, journal = {J. Hardw. Syst. Secur.}, volume = {5}, number = {2}, pages = {89--102}, year = {2021}, url = {https://doi.org/10.1007/s41635-021-00113-5}, doi = {10.1007/S41635-021-00113-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/RoyD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/ShomajiGGKWF21, author = {Sumaiya Shomaji and Zimu Guo and Fatemeh Ganji and Nima Karimian and Damon L. Woodard and Domenic Forte}, title = {BLOcKeR: {A} Biometric Locking Paradigm for IoT and the Connected Person}, journal = {J. Hardw. Syst. Secur.}, volume = {5}, number = {3}, pages = {223--236}, year = {2021}, url = {https://doi.org/10.1007/s41635-021-00121-5}, doi = {10.1007/S41635-021-00121-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/ShomajiGGKWF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/TchendjiMDY21, author = {Vianney Kengne Tchendji and Fabrice Mvah and Cl{\'{e}}mentin Tayou Djam{\'{e}}gni and Yannick Florian Yankam}, title = {E2BaSeP: Efficient Bayes Based Security Protocol Against {ARP} Spoofing Attacks in {SDN} Architectures}, journal = {J. Hardw. Syst. Secur.}, volume = {5}, number = {1}, pages = {58--74}, year = {2021}, url = {https://doi.org/10.1007/s41635-020-00105-x}, doi = {10.1007/S41635-020-00105-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/TchendjiMDY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/WeidlerGC21, author = {Nathanael R. Weidler and Ryan M. Gerdes and Thidapat Chantem}, title = {On the Limitations of Obfuscating Redundant Circuits in Frustrating Hardware Trojan Implantation}, journal = {J. Hardw. Syst. Secur.}, volume = {5}, number = {1}, pages = {75--87}, year = {2021}, url = {https://doi.org/10.1007/s41635-021-00111-7}, doi = {10.1007/S41635-021-00111-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/WeidlerGC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/YilmazAH21, author = {Yildiran Yilmaz and Leonardo Aniello and Basel Halak}, title = {{ASSURE:} {A} Hardware-Based Security Protocol for Resource-Constrained IoT Systems}, journal = {J. Hardw. Syst. Secur.}, volume = {5}, number = {1}, pages = {1--18}, year = {2021}, url = {https://doi.org/10.1007/s41635-020-00102-0}, doi = {10.1007/S41635-020-00102-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/YilmazAH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.