scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
08 Aug 2005
TL;DR: In this paper, a high level analysis is performed with chemical trajectories to determine potential canidates for REP trajectory optimization, and extensive analysis of direct trajectories using REP is performed on these candidates.
Abstract: Recent studies suggest significant benefits from using 1st and 2nd generation Radioisotope Power Systems (RPS) as a power source for electric propulsion (EP) missions to the outer planets. This study focuses on trajectories to the Trojan asteroids. A high level analysis is performed with chemical trajectories to determine potential canidates for REP trajectory optimization. Extensive analysis of direct trajectories using REP is performed on these candidates. Solar Electric Propulsion (SEP) trajectories are also considered for comparison against REP trajectories.

6 citations

Journal Article
TL;DR: A Trojan rapid detection based on heartbeat behavior analysis is proposed and TRDS is built based on the method, which can detect the Trojan communication in the 100 Mbit/s network rapidly and efficiently.
Abstract: Trojan detection algorithm based on behavior analysis of communication has high computational complexity.Addressing the problem,this paper proposes a Trojan rapid detection based on heartbeat behavior analysis.The method selects two session attributes to describe the difference between Trojan communication flow and normal communication flow on the basis of description of heartbeat behavior in the Trojan communication large numbers of analysis on Trojan samples.And then Trojan Rapid Detection System(TRDS) is built based on the method.Experimental results show that TRDS can detect the Trojan communication in the 100 Mbit/s network rapidly and efficiently.

5 citations

Proceedings ArticleDOI
01 Oct 2006
TL;DR: A theory based on granulation that has captured the essence of BN's intuitive idea, and the results are more than the Chinese wall models: malicious Trojan horses in certain DAC model (discretionary access control) can be controlled or confined.
Abstract: In 1989, Brewer and Nash (BN) presented a fascinating idea, called Chinese wall security policy model, for commercial security. Their idea was based on the analysis of the notion, conflict of interest binary relation (CIR). Unfortunately, their formalization did not fully catch the appropriate properties of CIR. In this paper, we present a theory based on granulation that has captured the essence of BN's intuitive idea. The results are more than the Chinese wall models: malicious Trojan horses in certain DAC model (discretionary access control) can be controlled or confined.

5 citations

Proceedings ArticleDOI
01 Aug 2016
TL;DR: Experimental results show that, compared with the hardware Trojan detection method based on Euclidean distance, even on the case that the Trojan scale is small the method can still achieve a higher detection success rate.
Abstract: As the threats of hardware Trojan becoming increasingly serious, we proposed a new hardware Trojan detection method based on class center Markov distance classification in this paper. After modeling the power characteristics of hardware Trojan, we demonstrated the feasibility of using class center distance to detect the hardware Trojan, and since the shortcomings of Euclidean distance in this area, we finally selected the Mahalanobis distance as the detection basis. Compared with the traditional hardware Trojan detection method, the process of our method is targeted optimized, and the detection accuracy is also improved. Experimental results show that, compared with the hardware Trojan detection method based on Euclidean distance, even on the case that the Trojan scale is small our method can still achieve a higher detection success rate.

5 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168