Author of the publication

Iron-Dome: Securing IoT Networked Systems at Runtime by Network and Device Characteristics to Confine Malware Epidemics.

, , , , and . ICCD, page 259-262. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RNN-Based Classifier to Detect Stealthy Malware using Localized Features and Complex Symbolic Sequence., , , and . ICMLA, page 406-409. IEEE, (2019)Neural network based ECG anomaly detection on FPGA and trade-off analysis., , and . ISCAS, page 1-4. IEEE, (2017)Special Session: Mitigating Side-Channel Attacks Through Circuit to Application Layer Approaches., , , , , , , , , and 5 other author(s). CODES+ISSS, page 8-17. IEEE, (2023)Survey of Machine Learning for Electronic Design Automation., , , , , , , and . ACM Great Lakes Symposium on VLSI, page 513-518. ACM, (2022)Adaptive-Gravity: A Defense Against Adversarial Samples., , , , , , and . ISQED, page 96-101. IEEE, (2022)DQN Based Exit Selection in Multi-Exit Deep Neural Networks for Applications Targeting Situation Awareness., , , and . ICCE, page 1-6. IEEE, (2022)Securing Hardware via Dynamic Obfuscation Utilizing Reconfigurable Interconnect and Logic Blocks., , , , , , and . DAC, page 229-234. IEEE, (2021)Smart I/Os: a data-pattern aware 2.5D interconnect with space-time multiplexing., , , and . SLIP, page 1-6. IEEE Computer Society, (2015)Neuromorphic-Enabled Security for IoT., , , , , , , , and . NEWCAS, page 153-157. IEEE, (2022)LOCK&ROLL: deep-learning power side-channel attack mitigation using emerging reconfigurable devices and logic locking., , , , , , , and . DAC, page 85-90. ACM, (2022)