Deep Learning for Computational Problems in Hardware Security: Modeling Attacks on Strong Physically Unclonable Function Circuits (Studies in Computational Intelligence)
Deep Learning for Computational Problems in Hardware Security: Modeling Attacks on Strong Physically Unclonable Function Circuits (Studies in Computational Intelligence)
Deep Learning for Computational Problems in Hardware Security: Modeling Attacks on Strong Physically Unclonable Function Circuits (Studies in Computational Intelligence) - Pranesh Santikellur; Rajat Subhra Chakraborty
New Book
Imported
to South Africa
*
Delivery: 24 Apr - 19 May
Shipping: 3 to 4 business days.
R 1,222.94
R 1,222.94
Delivery to any South Africa address between Friday, April 24 and Tuesday, May 19
Shipping
Origin: United Kingdom
Import costs included in the price ✅
Delivery to any South Africa address between Friday, April 24 and Tuesday, May 19.
Choose the list to add your product or create one New List
Deep Learning for Computational Problems in Hardware Security: Modeling Attacks on Strong Physically Unclonable Function Circuits (Studies in Computational Intelligence)
Pranesh Santikellur; Rajat Subhra Chakraborty
Synopsis "Deep Learning for Computational Problems in Hardware Security: Modeling Attacks on Strong Physically Unclonable Function Circuits (Studies in Computational Intelligence)"
The book discusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware security applications, in particular the techniques of launching potent "modeling attacks" on Physically Unclonable Function (PUF) circuits, which are promising hardware security primitives. The volume is self-contained and includes a comprehensive background on PUF circuits, and the necessary mathematical foundation of traditional and advanced machine learning techniques such as support vector machines, logistic regression, neural networks, and deep learning. This book can be used as a self-learning resource for researchers and practitioners of hardware security, and will also be suitable for graduate-level courses on hardware security and application of machine learning in hardware security. A stand-out feature of the book is the availability of reference software code and datasets to replicate the experiments described in the book.