語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Machine Learning for Embedded System Security
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Machine Learning for Embedded System Security/ edited by Basel Halak.
其他作者:
Halak, Basel.
面頁冊數:
XV, 160 p. 66 illus., 39 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Processor Architectures. -
電子資源:
https://doi.org/10.1007/978-3-030-94178-9
ISBN:
9783030941789
Machine Learning for Embedded System Security
Machine Learning for Embedded System Security
[electronic resource] /edited by Basel Halak. - 1st ed. 2022. - XV, 160 p. 66 illus., 39 illus. in color.online resource.
Introduction -- Machine Learning for Tamper Detection -- Machine Learning for IC Counterfeit Detection and Prevention -- Machine Learning for Secure PUF Design -- Machine Learning for Malware Analysis -- Machine Learning for Detection of Software Attacks -- Conclusions and Future Opportunities. .
This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design principles of more resilient PUF architectures. The second discusses the use of machine learning to mitigate the risks of security attacks on cyber-physical systems, with a particular focus on power plants. The third part provides an in-depth insight into the principles of malware analysis in embedded systems and describes how the usage of supervised learning techniques provides an effective approach to tackle software vulnerabilities. Discusses emerging technologies used to develop intelligent tamper detection techniques, using machine learning; Includes a comprehensive summary of how machine learning is used to combat IC counterfeit and to detect Trojans; Describes how machine learning algorithms are used to enhance the security of physically unclonable functions (PUFs); It describes, in detail, the principles of the state-of-the-art countermeasures for hardware, software, and cyber-physical attacks on embedded systems. .
ISBN: 9783030941789
Standard No.: 10.1007/978-3-030-94178-9doiSubjects--Topical Terms:
669787
Processor Architectures.
LC Class. No.: TK7895.E42
Dewey Class. No.: 006.22
Machine Learning for Embedded System Security
LDR
:02941nam a22003975i 4500
001
1093084
003
DE-He213
005
20220422130105.0
007
cr nn 008mamaa
008
221228s2022 sz | s |||| 0|eng d
020
$a
9783030941789
$9
978-3-030-94178-9
024
7
$a
10.1007/978-3-030-94178-9
$2
doi
035
$a
978-3-030-94178-9
050
4
$a
TK7895.E42
072
7
$a
UKM
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
UKM
$2
thema
082
0 4
$a
006.22
$2
23
245
1 0
$a
Machine Learning for Embedded System Security
$h
[electronic resource] /
$c
edited by Basel Halak.
250
$a
1st ed. 2022.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
XV, 160 p. 66 illus., 39 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Introduction -- Machine Learning for Tamper Detection -- Machine Learning for IC Counterfeit Detection and Prevention -- Machine Learning for Secure PUF Design -- Machine Learning for Malware Analysis -- Machine Learning for Detection of Software Attacks -- Conclusions and Future Opportunities. .
520
$a
This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design principles of more resilient PUF architectures. The second discusses the use of machine learning to mitigate the risks of security attacks on cyber-physical systems, with a particular focus on power plants. The third part provides an in-depth insight into the principles of malware analysis in embedded systems and describes how the usage of supervised learning techniques provides an effective approach to tackle software vulnerabilities. Discusses emerging technologies used to develop intelligent tamper detection techniques, using machine learning; Includes a comprehensive summary of how machine learning is used to combat IC counterfeit and to detect Trojans; Describes how machine learning algorithms are used to enhance the security of physically unclonable functions (PUFs); It describes, in detail, the principles of the state-of-the-art countermeasures for hardware, software, and cyber-physical attacks on embedded systems. .
650
2 4
$a
Processor Architectures.
$3
669787
650
2 4
$a
Electronics Design and Verification.
$3
1387809
650
1 4
$a
Embedded Systems.
$3
1026431
650
0
$a
Computer architecture.
$3
528145
650
0
$a
Microprocessors.
$3
632481
650
0
$a
Electronic circuit design.
$3
596419
650
0
$a
Embedded computer systems.
$3
562313
700
1
$a
Halak, Basel.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1203733
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030941772
776
0 8
$i
Printed edition:
$z
9783030941796
776
0 8
$i
Printed edition:
$z
9783030941802
856
4 0
$u
https://doi.org/10.1007/978-3-030-94178-9
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入