Now showing items 1-2 of 2
Web-Based Automated System for Cyber Analytics
There have been many cyber attacks in recent years despite significant increases in security measures. This research aims to address the following research question: Can cyber breaches be analyzed automatically using ...
Think Smart, Play Dumb: A Game Theoretic Approach to Study Deception in Hardware Trojan Testing
In recent years, integrated circuits (ICs) have become a significant part in the operations for various industries and have given hardware security a greater priority, specifically in the supply chain where malicious ...