期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
Low-power emerging memristive designs towards secure hardware systems for applications in internet of things 被引量:2
1
作者 Nan Du Heidemarie Schmidt Ilia Polian 《Nano Materials Science》 CAS CSCD 2021年第2期186-204,共19页
Emerging memristive devices offer enormous advantages for applications such as non-volatile memories and inmemory computing(IMC),but there is a rising interest in using memristive technologies for security application... Emerging memristive devices offer enormous advantages for applications such as non-volatile memories and inmemory computing(IMC),but there is a rising interest in using memristive technologies for security applications in the era of internet of things(IoT).In this review article,for achieving secure hardware systems in IoT,lowpower design techniques based on emerging memristive technology for hardware security primitives/systems are presented.By reviewing the state-of-the-art in three highlighted memristive application areas,i.e.memristive non-volatile memory,memristive reconfigurable logic computing and memristive artificial intelligent computing,their application-level impacts on the novel implementations of secret key generation,crypto functions and machine learning attacks are explored,respectively.For the low-power security applications in IoT,it is essential to understand how to best realize cryptographic circuitry using memristive circuitries,and to assess the implications of memristive crypto implementations on security and to develop novel computing paradigms that will enhance their security.This review article aims to help researchers to explore security solutions,to analyze new possible threats and to develop corresponding protections for the secure hardware systems based on low-cost memristive circuit designs. 展开更多
关键词 Memristive technology Nanoelectronic device Low-power consumption MINIATURIZATION Nonvolatility RECONFIGURABILITY In memory computing Artificial intelligence Hardware security primitives Machine learning-related attacks and defenses
在线阅读 下载PDF
Adaptation of the Two Sources of Code and One-Hot Encoding Method for Designing a Model of Microprogram Control Unit with Output Identification 被引量:3
2
作者 Lukasz Smolinski Alexander Barkalov Larysa Titarenko 《Intelligent Control and Automation》 2015年第2期116-125,共10页
This article presents a proposal for a model of a microprogram control unit (CMCU) with output identification adapted for implementation in complex programmable logic devices (CPLD) equipped with integrated memory mod... This article presents a proposal for a model of a microprogram control unit (CMCU) with output identification adapted for implementation in complex programmable logic devices (CPLD) equipped with integrated memory modules [1]. An approach which applies two sources of code and one-hot encoding has been used in a base CMCU model with output identification [2] [3]. The article depicts a complete example of processing for the proposed CMCU model. Furthermore, it also discusses the advantages and disadvantages of the approach in question and presents the results of the experiments conducted on a real CPLD system. 展开更多
关键词 CPLD PAL UFM CLB Two Sources of Code One-Hot Encoding CMCU
在线阅读 下载PDF
The Application and Adaptation of the Two Sources of Code and Natural Encoding Method for Designing a Model of Microprogram Control Unit with Base Structure 被引量:2
3
作者 Lukasz Smolinski Alexander Barkalov Larysa Titarenko 《Circuits and Systems》 2014年第12期301-308,共8页
The article presents a modification to the method which applies two sources of data. The modification is depicted on the example of a compositional microprogram control unit (CMCU) model with base structure implemente... The article presents a modification to the method which applies two sources of data. The modification is depicted on the example of a compositional microprogram control unit (CMCU) model with base structure implemented in the complex programmable logic devices (CPLD). First, the conditions needed to apply the method are presented, followed by the results of its implementation in real hardware. 展开更多
关键词 CPLD PAL UFM CLB Two Sources of Code One-Hot Encoding Natural Encoding CMCU
在线阅读 下载PDF
A Simple Model for On-Sensor Phase-Detection Autofocusing Algorithm 被引量:2
4
作者 Przemyslaw Sliwinski Pawel Wachel 《Journal of Computer and Communications》 2013年第6期11-17,共7页
A simple model of the phase-detection autofocus device based on the partially masked sensor pixels is described. The cross-correlation function of the half-images registered by the masked pixels is proposed as a focus... A simple model of the phase-detection autofocus device based on the partially masked sensor pixels is described. The cross-correlation function of the half-images registered by the masked pixels is proposed as a focus function. It is shown that—in such setting—focusing is equivalent to searching of the cross-correlation function maximum. Application of stochastic approximation algorithms to unimodal and non-unimodal focus functions is shortly discussed. 展开更多
关键词 Phase Detection Autofocus On-Sensor Circuit Formal Model CROSS-CORRELATION Stochastic Approximation
在线阅读 下载PDF
Flaws in the Field of Digital Security in the Workplace: Case of Companies in Burkina Faso
5
作者 Yanogo Kiswendsida Jean Hermann Ouedraogo Tounwendyam Frederic 《Open Journal of Applied Sciences》 CAS 2022年第12期2124-2134,共11页
Digital in the daily life of companies undeniably leads them to use services and applications of all kinds. Companies in their permanent quest for the exchange of information devote themselves to the use of the Intern... Digital in the daily life of companies undeniably leads them to use services and applications of all kinds. Companies in their permanent quest for the exchange of information devote themselves to the use of the Internet which nowadays constitutes an open door for the birth of several types of faults, some of which are unknown to certain digital professionals in the field. Corporate. The purpose of this research is to show the probable existence of digital security flaws in the daily activities carried out by companies in Burkina Faso. In companies in Burkina Faso, we seem to see a way of working that does not respect the standards and safety standards prescribed by ISO 27001. We seem to see a way of working based on the result of the gain and not on the securities measures and integrity of critical data, data confidentiality, management and prevention of possible security risks related to their activities. We seem to be witnessing in companies the immanent presence of faults which could be the work of the users of the system, of the infrastructure used which is outdated or badly configured, of software anomalies linked to programming errors, and to poor implementation of the security policy within the companies. This research is important because it exposes the handicaps that companies have in terms of digital security. The expected result is to bring out existing flaws that are not taken seriously by IT staff and propose possible solutions to overcome these security risks. 展开更多
关键词 Security Risks Digital Security Flaws Integrity of Critical Data
在线阅读 下载PDF
Study on the Use of Artificial Intelligence for Cybersecurity in Companies: Case of Companies in Burkina Faso
6
作者 Yanogo Kiswendsida Jean Hermann Ouedraogo Tounwendyam Frederic 《Engineering(科研)》 2023年第12期798-809,共12页
Poorly secured connected objects can compromise the security of an entire company, or even paralyze others. As useful as they are, they can be open doors for computer attacks against the company. To protect themselves... Poorly secured connected objects can compromise the security of an entire company, or even paralyze others. As useful as they are, they can be open doors for computer attacks against the company. To protect themselves, large companies set up expensive infrastructures to analyze the data that circulates inside and outside the company. They install a SOC, a Security Operation Center whose objective is to identify and analyze, using various tools, the level of protection of a company and, if necessary, to alert on vulnerabilities and leaks of security data. However, the attack detection capabilities of traditional systems are based on a base of known signatures. Problem is that it is increasingly rare to have to face threats whose signature is unknown. Artificial intelligence, on the contrary, does not look for fingerprints in the packets carrying the attack, but rather analyzes how these packets are arranged. The objective of this study is to show that the use of artificial intelligence in companies may be low and to show the positive impacts of its use compared to the traditional system used in companies. We also simulate an attack on a system equipped with artificial intelligence to highlight the advantages of AI in a computer attack. This research is important because it highlights the risks that companies expose themselves to by always remaining secure in their systems based on traditional techniques. The aim of this research is to show the advantages that AI offers on cyber security compared to the traditional security system. The expected result is to show the existing issues regarding the rate of use of AI on cybersecurity in Burkina Faso. . 展开更多
关键词 CYBERSECURITY Artificial Intelligence Computer System Computer Attack In-formation Security
在线阅读 下载PDF
Efficiency Analysis of the Autofocusing Algorithm Based on Orthogonal Transforms
7
作者 Przemyslaw Sliwinski Krzysztof Berezowski +1 位作者 Piotr Patronik Pawel Wachel 《Journal of Computer and Communications》 2013年第6期41-45,共5页
Efficiency of the autofocusing algorithm implementations based on various orthogonal transforms is examined. The algorithm uses the variance of an image acquired by a sensor as a focus function. To compute the estimat... Efficiency of the autofocusing algorithm implementations based on various orthogonal transforms is examined. The algorithm uses the variance of an image acquired by a sensor as a focus function. To compute the estimate of the variance we exploit the equivalence between that estimate and the image orthogonal expansion. Energy consumption of three implementations exploiting either of the following fast orthogonal transforms: the discrete cosine, the Walsh-Hadamard, and the Haar wavelet one, is evaluated and compared. Furthermore, it is conjectured that the computation precision can considerably be reduced if the image is heavily corrupted by the noise, and a simple problem of optimal word bit-length selection with respect to the signal variance is analyzed. 展开更多
关键词 AUTO-FOCUSING Image Variance Discrete Orthogonal Transforms Word-Length Selection Architectural Performance Evaluation
在线阅读 下载PDF
Study on the Instability of Information Systems and Security Risks in the Public Administration: Case of Burkina Faso Public Administration
8
作者 Yanogo Kiswendsida Jean Hermann 《Journal of Information Security》 2022年第2期76-84,共9页
The purpose of this research is to show the instability and the security risks of the information system in Burkina-Faso public administration. In this paper, witnessing unsatisfactory services such as government mess... The purpose of this research is to show the instability and the security risks of the information system in Burkina-Faso public administration. In this paper, witnessing unsatisfactory services such as government messaging (mailer.gov.bf) as well as G-cloud services which are the government cloud were studied. The behavior of user agents on the administration’s IT infrastructures which could expose the information system to security risks was also studied. The expected result shows evidence of the weakness of the public administration information system and provides some recommendation. 展开更多
关键词 Mailer.gov.bf Resina Network G-Cloud Burkina-Faso Public Administration
在线阅读 下载PDF
Elastic Smart Contracts in Blockchains 被引量:4
9
作者 Schahram Dustdar Pablo Fernández +1 位作者 JoséMaría García Antonio Ruiz-Cortés 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第12期1901-1912,共12页
In this paper,we deal with questions related to blockchains in complex Internet of Things(IoT)-based ecosystems.Such ecosystems are typically composed of IoT devices,edge devices,cloud computing software services,as w... In this paper,we deal with questions related to blockchains in complex Internet of Things(IoT)-based ecosystems.Such ecosystems are typically composed of IoT devices,edge devices,cloud computing software services,as well as people,who are decision makers in scenarios such as smart cities.Many decisions related to analytics can be based on data coming from IoT sensors,software services,and people.However,they are typically based on different levels of abstraction and granularity.This poses a number of challenges when multiple blockchains are used together with smart contracts.This work proposes to apply our concept of elasticity to smart contracts and thereby enabling analytics in and between multiple blockchains in the context of IoT.We propose a reference architecture for Elastic Smart Contracts and evaluate the approach in a smart city scenario,discussing the benefits in terms of performance and self-adaptability of our solution. 展开更多
关键词 Blockchain ELASTICITY Internet of Things(IoT) smart cities smart contracts virtual chains
在线阅读 下载PDF
Introduction to the Special Issue on Intelligent Models for Security and Resilience in Cyber Physical Systems
10
作者 Qi Liu Xiaodong Liu +1 位作者 Radu Grosu Ching-Nung Yang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第4期23-26,共4页
Cyber Physical Systems(CPS)have been appealing in recent years as a result of the rapid emergence of unique hardware and software compositions that create smart,autonomously behaving devices.End-to-end procedures and ... Cyber Physical Systems(CPS)have been appealing in recent years as a result of the rapid emergence of unique hardware and software compositions that create smart,autonomously behaving devices.End-to-end procedures and new types of user-machine interaction are made possible via the CPS.On the one hand,these CPS applications have the potential to deliver crucial services in a variety of developing application areas,including energy management,healthcare,traffic monitoring,industrial assessment and surveillance. 展开更多
关键词 CPS HARDWARE SERVICES
在线阅读 下载PDF
Byzantine Fault-Tolerant Routing for Large-Scale Wireless Sensor Networks Based on Fast ECDSA 被引量:1
11
作者 Jiawei Xu Keda Wang +4 位作者 Chao Wang Feng Hu Zhenhua Zhang Shiyi Xu Jie Wu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2015年第6期627-633,共7页
Wireless sensor networks are a favorite target of Byzantine malicious attackers because of their limited energy, low calculation capability, and dynamic topology, and other important characteristics. The Byzantine Gen... Wireless sensor networks are a favorite target of Byzantine malicious attackers because of their limited energy, low calculation capability, and dynamic topology, and other important characteristics. The Byzantine Generals Problem is one of the classical problems in the area of fault tolerance, and has wide application, especially in distributed databases and systems. There is a lot of research in agreement and replication techniques that tolerate Byzantine faults. However, most of this work is not suited to large-scale wireless sensor networks, due to its high computational complexity. By introducing Fast ECDSA(Elliptic Curve Digital Signature Algorithm), which can resist timing and energy attacks, and reduce the proportion of verifying signature algorithm to generating signature algorithm to 1.2 times, we propose a new Byzantine fault-tolerant routing algorithm for large-scale wireless sensor networks with double-level hierarchical architecture. In different levels, the algorithm runs different BFT protocols.Theory and simulation results have proved that this algorithm has high security and the number of communication rounds between clusters is reduced by 1/3, which balances the network load. At the same time, the application of Fast ECDSA improves the security level of the network without burdening it. 展开更多
关键词 wireless sensor networks Byzantine Generals Proble
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部