Articles with "based attacks" as a keyword



Blockchain Technologies for the Internet of Things: Research Issues and Challenges

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2018.2882794

Abstract: This paper presents a comprehensive survey of the existing blockchain protocols for the Internet of Things (IoT) networks. We start by describing the blockchains and summarizing the existing surveys that deal with blockchain technologies. Then,… read more here.

Keywords: internet things; based attacks; blockchain; blockchain technologies ... See more keywords

SecureX: Strategically Securing Designs Against Oracle-Less Attacks Using GNN-Based Explainers

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Circuits and Systems I: Regular Papers"

DOI: 10.1109/tcsi.2025.3565155

Abstract: Logic locking is a promising design-for-trust solution that protects integrated circuits (ICs) from hardware security threats such as design intellectual property (IP) piracy and illegal overproduction of ICs. With the ubiquity of machine learning (ML),… read more here.

Keywords: securex strategically; gnn based; logic; based attacks ... See more keywords

EM Monitoring and Classification of IEMI and Protocol-Based Attacks on IEEE 802.11n Communication Networks

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Electromagnetic Compatibility"

DOI: 10.1109/temc.2019.2900262

Abstract: The development of connected devices and their daily use is presently at the origin of the omnipresence of Wi-Fi wireless networks. However, these Wi-Fi networks are often vulnerable, and can be used by malicious people… read more here.

Keywords: communication; based attacks; protocol; protocol based ... See more keywords