menu
{ "item_title" : "Machine Learning for Embedded System Security", "item_author" : [" Basel Halak "], "item_description" : "This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design principles of more resilient PUF architectures. The second discusses the use of machine learning to mitigate the risks of security attacks on cyber-physical systems, with a particular focus on power plants. The third part provides an in-depth insight into the principles of malware analysis in embedded systems and describes how the usage of supervised learning techniques provides an effective approach to tackle software vulnerabilities.", "item_img_path" : "https://covers1.booksamillion.com/covers/bam/3/03/094/177/3030941779_b.jpg", "price_data" : { "retail_price" : "109.99", "online_price" : "109.99", "our_price" : "109.99", "club_price" : "109.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Machine Learning for Embedded System Security|Basel Halak

Machine Learning for Embedded System Security

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design principles of more resilient PUF architectures. The second discusses the use of machine learning to mitigate the risks of security attacks on cyber-physical systems, with a particular focus on power plants. The third part provides an in-depth insight into the principles of malware analysis in embedded systems and describes how the usage of supervised learning techniques provides an effective approach to tackle software vulnerabilities.

This item is Non-Returnable

Details

  • ISBN-13: 9783030941772
  • ISBN-10: 3030941779
  • Publisher: Springer
  • Publish Date: April 2022
  • Dimensions: 9.21 x 6.14 x 0.44 inches
  • Shipping Weight: 0.94 pounds
  • Page Count: 160

Related Categories

You May Also Like...

    1

BAM Customer Reviews