[HTML][HTML] Smart grids and renewable energy systems: Perspectives and grid integration challenges
M Khalid - Energy Strategy Reviews, 2024 - Elsevier
The concept of smart grid (SG) was made real to give the power grid the functions and
features it needs to make a smooth transition towards renewable energy integration and …
features it needs to make a smooth transition towards renewable energy integration and …
Hardware security for Internet of Things identity assurance
With the proliferation of Internet of Things (IoT) devices, there is an increasing need to
prioritize their security, especially in the context of identity and authentication mechanisms …
prioritize their security, especially in the context of identity and authentication mechanisms …
Ranking security of IoT-based smart home consumer devices
NM Allifah, IA Zualkernan - Ieee Access, 2022 - ieeexplore.ieee.org
Manufacturers of smart home consumer devices like home theatres, music players, voice-
based assistants, smart lighting, and security cameras have widely adopted the Internet of …
based assistants, smart lighting, and security cameras have widely adopted the Internet of …
CT PUF: Configurable tristate PUF against machine learning attacks for IoT security
Physical unclonable function (PUF) is a promising lightweight hardware security primitive for
resource-limited Internet-of-Things (IoT) devices. Strong PUFs are suitable for lightweight …
resource-limited Internet-of-Things (IoT) devices. Strong PUFs are suitable for lightweight …
A survey on hardware security: Current trends and challenges
Hardware security has become a critical concern due to the globalization of the Integrated
Circuit (IC) supply chain and the complex network connections of computing-intensive …
Circuit (IC) supply chain and the complex network connections of computing-intensive …
A cost-driven method for deep-learning-based hardware trojan detection
The Cyber-Physical System and even the Metaverse will become the second space in which
human beings live. While bringing convenience to human beings, it also brings many …
human beings live. While bringing convenience to human beings, it also brings many …
HW2VEC: A graph learning tool for automating hardware security
The time-to-market pressure and continuous growing complexity of hardware designs have
promoted the globalization of the Integrated Circuit (IC) supply chain. However, such …
promoted the globalization of the Integrated Circuit (IC) supply chain. However, such …
FSM inspired unconventional Hardware Watermark using field-assisted SOT-MTJ
The globalization of the Integrated Circuits supply chain has increased threats from
untrusted entities involved in the process. Several mechanisms, such as logic locking …
untrusted entities involved in the process. Several mechanisms, such as logic locking …
Rethinking watermark: Providing proof of IP ownership in modern socs
Intellectual property (IP) cores are essential to creating modern system-on-chips (SoCs).
Protecting the IPs deployed in modern SoCs has become more difficult as the IP houses …
Protecting the IPs deployed in modern SoCs has become more difficult as the IP houses …
A survey of high level synthesis based hardware security approaches for reusable IP cores [feature]
This paper presents a novel survey of high level synthesis (HLS) based hardware security
approaches for reusable intellectual property (IP) cores used in consumer electronics and …
approaches for reusable intellectual property (IP) cores used in consumer electronics and …