Explore projects
-
Attempt to do outlier detection with VAE on UNSW NB15 (network attacks) dataset
Updated -
Updated
-
Most of the content (excluding "private" slides). See the wiki section.
Updated -
Example using d3 and angularjs to build an interactive network display.
Updated -
Valentina Zantedeschi / c2lm
GNU General Public License v3.0 onlyUpdated -
SESAM / Centrality-based logic masking
MIT LicenseCentrality indicators as node selection heuristics for logic masking.
Updated -
SESAM / Graph analysis-based logic locking
MIT LicenseUse graph analysis to insert logic gates in a combinational netlist so that it can be locked.
Updated -
SESAM / Combinational netlist parsers
MIT LicenseParsing several combinational netlist formats into igraph graphs
Updated -
Updated
-
A method to generate PLL-TRNG parameters by constraint programming
Updated -
SESAM / IP protection demonstrator
MIT LicenseDemonstrator of logic locking, logic masking and CASCADE protocol for PUF responses implemented on the HECTOR board
Updated -
Updated
-
VHDL sources to ensure repeatability of the work carried in the paper "Transient Efect Ring Oscillator based Physical Unclonable Function in FPGA leaks"
Updated