Machine Learning for Embedded System Security

Machine Learning for Embedded System Security

Basel Halak

122,24 €
IVA incluido
Consulta disponibilidad
Editorial:
Springer Nature B.V.
Año de edición:
2022
ISBN:
9783030941772

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

This book comprehensively covers the state-of-the-art security applications of machine learning techniques.  The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design principles of more resilient PUF architectures. The second discusses the use of machine learning to mitigate the risks of security attacks on cyber-physical systems, with a particular focus on power plants. The third part provides an in-depth insight into the principles of malware analysis in embedded systems and describes how the usage of supervised learning techniques provides an effective approach to tackle software vulnerabilities. 

Artículos relacionados

  • CLOUD TO EDGEWARE
    BROOKS TYSON T / TYSON T BROOKS
    This comprehensive book presents a new approach to dynamic distributed virtual systems. Wireless grids edgeware promises new cloud to edge secure architectures with mobile security for the Internet of Things (IoT). The scope covers framworks and models for wireless grids edgeware, as well as open specifications and new applications called gridlets and wiglets.The book also high...
  • Solutions Architect’s Handbook - Third Edition
    Neelanjali Srivastav / Saurabh Shrivastava
    From fundamentals and design patterns to the latest techniques such as generative AI, machine learning and cloud native architecture, gain all you need to be a pro Solutions Architect crafting secure and reliable AWS architecture.Key Features:- Hits all the key areas -Rajesh Sheth, VP, Elastic Block Store, AWS- Offers the knowledge you need to succeed in the evolving landscape ...
    Disponible

    84,87 €

  • Generative AI for Cloud Solutions
    Anurag Karuparti / Paul Singh
    Explore Generative AI, the engine behind ChatGPT, and delve into topics like LLM-infused frameworks, autonomous agents, and responsible innovation, to gain valuable insights into the future of AI Key FeaturesGain foundational GenAI knowledge and understand how to scale GenAI/ChatGPT in the cloudUnderstand advanced techniques for customizing LLMs for organizations via fine-tunin...
    Disponible

    75,16 €

  • Segurança De Serviços Em Nuvem Na Prática
    Hélio Watanabe
    Segurança de Serviços em Nuvem na Prática: utilizando a ISO 27017 em empresas no Brasilé um guia prático voltado para a implementação de medidas de segurança da informação em serviços de nuvem, com foco nas particularidades do mercado brasileiro.O livro aborda a importância crescente da computação em nuvem e os desafios associados à sua segurança, introduzindo a norma ISO/IEC 2...
    Disponible

    9,88 €

  • The Habits of Great Developers
    Tom Henricksen
    Developers want great results and must focus on the small habits.Don’t you wish someone asked great developers how they do it? Tom Henricksen has reached out to leading coders and compiled their advice into one place.Here are some of the people whom he worked with:David FarleyWoody ZuillDoc NortonGeePaw HillDavid NealAndrew StellmanLuca RossiTom has distilled down the small ste...
    Disponible

    17,79 €

  • Enterprise Architects
    Svyatoslav Kotusev
    Enterprise architects are specialized industry professionals responsible for leading joint business and IT planning in organizations, thereby enabling the success of their digital transformation efforts. Despite their immediate relevance to today’s ubiquitous digitalization tendencies, the very presence of enterprise architects, as unique organizational characters, is largely u...
    Disponible

    85,82 €

Otros libros del autor

  • Machine Learning for Embedded System Security
    Basel Halak
    This book comprehensively covers the state-of-the-art security applications of machine learning techniques.  The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design...
    Disponible

    123,59 €

  • Hardware Supply Chain Security
    Basel Halak
    This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new  type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets...
    Disponible

    111,49 €

  • Authentication of Embedded Devices
    Basel Halak
    This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications.The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Co...
    Disponible

    80,65 €

  • Hardware Supply Chain Security
    Basel Halak
    This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new  type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets...
  • Authentication of Embedded Devices
    Basel Halak
    This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications.The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Co...
  • Ageing of Integrated Circuits
    Basel Halak
    This book provides comprehensive coverage of the latest research into integrated circuits’ ageing, explaining the causes of this phenomenon, describing its effects on electronic systems, and providing mitigation techniques to build ageing-resilient circuits.   ...
    Disponible

    111,52 €