Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Language: English
    Angaben zur Quelle: 96/4, 2016, S. 1029-1036
    Note: Niti Shukla, Gopa Bhardwaj and Prabhat Kumar Mishra
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780123742872
    Language: English
    Pages: 1 online resource (432 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Efficient design of embedded processors plays a critical role in embedded systems design. Processor description languages and their associated specification, exploration and rapid prototyping methodologies are used to find the best possible design for a given set of applications under various design constraints, such as area, power and performance. This book is the first, comprehensive survey of modern architecture description languages and will be an invaluable reference for embedded system architects, designers, developers, and validation engineers. Readers will see that the use of particular architecture description languages will lead to productivity gains in designing particular (application-specific) types of embedded processors. * Comprehensive coverage of all modern architecture description languages... use the right ADL to design your processor to fit your application; * Most up-to-date information available about each architecture description language from the developers...save time chasing down reliable documentation; * Describes how each architecture desccription language enables key design automation tasks, such as simulation, synthesis and testing...fit the ADL to your design cycle;
    Note: Online resource; Title from title page (viewed July 28, 2011) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Cham : Springer Nature Switzerland | Cham : Imprint: Springer
    ISBN: 9783031464799
    Language: English
    Pages: 1 Online-Ressource(XVIII, 243 p. 113 illus., 106 illus. in color.)
    Edition: 1st ed. 2023.
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Keywords: Computational intelligence. ; Electronic circuits. ; Data protection. ; Electronic circuit design. ; Embedded computer systems. ; Artificial intelligence.
    Abstract: Part 1: Introduction -- Chapter 1. Cybersecurity Landscape for Computer Systems -- Chapter 2. Explainable Artificial Intelligence -- Part 2: Detection of Software Vulnerabilities -- Chapter 3. Malware Detection using Explainable AI -- Chapter 4. Spectre and Meltdown Detection using Explainable AI -- Part 3: Detection of Hardware Vulnerabilities -- Chapter 5. Hardware Trojan Detection using Reinforcement Learning -- Chapter 6. Hardware Trojan Detection using Side-Channel Analysis -- Chapter 7. Hardware Trojan Detection using Shapley Ensemble Boosting -- Part 4: Mitigation of AI Vulnerabilities -- Chapter 8. Mitigation of Adversarial Machine Learning -- Chapter 9. AI Trojan Attacks and Countermeasures -- Part 5: Acceleration of Explainable AI -- Chapter 10. Hardware Acceleration of Explainable AI -- Chapter 11. Explainable AI Acceleration using Tensor Processing Units -- Part 6: Conclusion -- Chapter 12. The Future of AI-Enabled Cybersecurity.
    Abstract: This book provides a comprehensive overview of security vulnerabilities and state-of-the-art countermeasures using explainable artificial intelligence (AI). Specifically, it describes how explainable AI can be effectively used for detection and mitigation of hardware vulnerabilities (e.g., hardware Trojans) as well as software attacks (e.g., malware and ransomware). It provides insights into the security threats towards machine learning models and presents effective countermeasures. It also explores hardware acceleration of explainable AI algorithms. The reader will be able to comprehend a complete picture of cybersecurity challenges and how to detect them using explainable AI. This book serves as a single source of reference for students, researchers, engineers, and practitioners for designing secure and trustworthy systems. Introduces a wide variety of software and hardware vulnerabilities; Describes solutions for detecting security attacks using explainable AI; Presents a fast and robust framework using hardware acceleration and mitigation of adversarial attacks.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...