Internet of things security threats analysis / Mahmoud Maher Elsayed Mohammed ; Supervised Amin Mohamed Nassar
Material type:
- تحليل التهديدات الامنية لانترنت الاشياء [Added title page title]
- Issued also as CD
Item type | Current library | Home library | Call number | Copy number | Status | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
قاعة الرسائل الجامعية - الدور الاول | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.13.08.M.Sc.2019.Ma.I (Browse shelf(Opens below)) | Not for loan | 01010110079456000 | ||
![]() |
مخـــزن الرســائل الجـــامعية - البدروم | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.13.08.M.Sc.2019.Ma.I (Browse shelf(Opens below)) | 79456.CD | Not for loan | 01020110079456000 |
Browsing المكتبة المركزبة الجديدة - جامعة القاهرة shelves Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | ||
Cai01.13.08.M.Sc.2019.Hu.H Hardware implementation of a simplified radix-4 successive cancellation decoder for polar codes / | Cai01.13.08.M.Sc.2019.Is.E Energy efficient smart wireless sensor network for border monitoring / | Cai01.13.08.M.Sc.2019.Is.E Energy efficient smart wireless sensor network for border monitoring / | Cai01.13.08.M.Sc.2019.Ma.I Internet of things security threats analysis / | Cai01.13.08.M.Sc.2019.Ma.I Internet of things security threats analysis / | Cai01.13.08.M.Sc.2019.Ma.L Low-power RF predistortion for broadband MM-wave power amplifiers / | Cai01.13.08.M.Sc.2019.Ma.L Low-power RF predistortion for broadband MM-wave power amplifiers / |
Thesis (M.Sc.) - Cairo University - Faculty of Engineering - Department of Electronics and Communications
Internet of Things (IoT) devices starts to spread all over the world. IoT revolution makes the devices smarter and it improves the performance of the devices. The devices can now exchange information between each other and distribute data analysis effort between each other or send it to data analysis center. As a prediction from Cisco, the number of IoT devices will be 50 billion IoT device connected together in 2020. This enormous number will make us think about immunity of these IoT devices against the Hardware attacks. We propose in this Thesis the effect of inserting Hardware Threat in Coordinate Rotation Digital Computer (CORDIC). Methods are presented in this Thesis to identify Hardware Trojan and its effect on the CORDIC performance. Two ways to improve the immunity of the hardware design against Hardware Trojan are represented here
Issued also as CD
There are no comments on this title.