Linked e-resources

Details

Introduction to System-on-Chip Design using Network-on-Chip
Network-on-Chip Security Challenges due to Supply Chain
Characterizing and Optimizing Performance in NoC Architectures
Characterizing and Optimizing Energy in NoC Architectures
Modeling NoC in Architectural Simulators
Eavesdropping Attacks
Data Integrity Attacks
Denial-of-Service Attacks
Side-Channel Attacks
Emerging Security Vulnerabilities in NoC-based SoCs
Lightweight Encryption and authentication in NoC-based SoCs
Trust-aware Routing in NoC-based SoCs
Route and Data Randomization in NoC-based SoCs
Mitigating Side-Channel Attacks in NoC-based SoCs
Real-time Detection and Localization of DoS attacks
Digital Watermarking for Detecting Malicious IP Cores
Authorization for NoC Resource Accesses
Formal Verification of NoC Security Properties
NoC Trust Verification using Security Assertions
Securing Optical/Photonic NoC
Securing Wireless NoC
Securing 2.5 and 3D NoC
Future of Trustworthy On-Chip Communication
Conclusions and Future Directions.

Browse Subjects

Show more subjects...

Statistics

from
to
Export