This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design principles of more resilient PUF architectures. The second discusses the use of machine learning to mitigate the risks of security attacks on cyber-physical systems, with a particular focus on power plants. The third part provides an in-depth insight into the principles of malware analysis in embedded systems and describes how the usage of supervised learning techniques provides an effective approach to tackle software vulnerabilities.
"synopsis" may belong to another edition of this title.
Dr. Basel Halak is the director of the embedded systems and IoT program at the University of Southampton, a visiting scholar at the Technical University of Kaiserslautern, a visiting professor at the Kazakh-British Technical University, an industrial fellow of the royal academy of engineering, and a national teaching fellow of the Advance Higher Education(HE) Academy. Dr. Halak's publications include over 80-refereed conference and journal papers and authored four books, including the first textbook on Physically Unclonable Functions. His research expertise includes evaluation of the security of hardware devices, development of countermeasures, mathematical formalism of reliability issues in CMOS circuits (e.g. crosstalk, radiation, aging), and the use of fault tolerance techniques to improve the robustness of electronics systems against such issues. Dr. Halak lectures on digital design, Secure Hardware, and Cryptography. Dr. Halak serves on several technical program committees such as HOST, IEEE DATE, IVSW, and DAC. He is an associate editor of IEEE access and an editor of the IET circuit devices and system journal. He is also a member of the hardware security-working group of the World Wide Web Consortium (W3C).
This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design principles of more resilient PUF architectures. The second discusses the use of machine learning to mitigate the risks of security attacks on cyber-physical systems, with a particular focus on power plants. The third part provides an in-depth insight into the principles of malware analysis in embedded systems and describes how the usage of supervised learning techniques provides an effective approach to tackle software vulnerabilities.
Discusses emerging technologies used to develop intelligent tamper detection techniques, using machine learning;
Includes a comprehensive summary of how machine learning is used to combat IC counterfeit and to detect Trojans;
Describes how machine learning algorithms are used to enhance the security of physically unclonable functions (PUFs);
It describes, in detail, the principles of the state-of-the-art countermeasures for hardware, software, and cyber-physical attacks on embedded systems.
"About this title" may belong to another edition of this title.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9783030941802_new
Quantity: Over 20 available
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design principles of more resilient PUF architectures. The second discusses the use of machine learning to mitigate the risks of security attacks on cyber-physical systems, with a particular focus on power plants. The third part provides an in-depth insight into the principles of malware analysis in embedded systems and describes how the usage of supervised learning techniques provides an effective approach to tackle software vulnerabilities. 176 pp. Englisch. Seller Inventory # 9783030941802
Quantity: 2 available
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. 1st ed. 2022 edition NO-PA16APR2015-KAP. Seller Inventory # 26396290519
Seller: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Ireland
Condition: New. Seller Inventory # V9783030941802
Quantity: 15 available
Seller: moluna, Greven, Germany
Kartoniert / Broschiert. Condition: New. Seller Inventory # 842326371
Quantity: Over 20 available
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Print on Demand. Seller Inventory # 401167880
Quantity: 4 available
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. PRINT ON DEMAND. Seller Inventory # 18396290525
Quantity: 4 available
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 175 pages. 9.25x6.10x0.38 inches. In Stock. Seller Inventory # x-3030941809
Quantity: 2 available
Seller: Kennys Bookstore, Olney, MD, U.S.A.
Condition: New. Seller Inventory # V9783030941802
Seller: preigu, Osnabrück, Germany
Taschenbuch. Condition: Neu. Machine Learning for Embedded System Security | Basel Halak | Taschenbuch | xv | Englisch | 2023 | Springer | EAN 9783030941802 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu Print on Demand. Seller Inventory # 126763614
Quantity: 5 available