Chrome Extension
WeChat Mini Program
Use on ChatGLM

Construction of knowledge graph of hardware Trojan detection method

2022 7th Asia Conference on Power and Electrical Engineering (ACPEE)(2022)

Cited 0|Views1
No score
Abstract
In order to visually present all kinds of hardware Trojan horse detection methods and their relationship, a method is proposed to construct the knowledge graph of hardware Trojan horse detection technology. Firstly, the security-related knowledge of hardware Trojan horse is analyzed, then the entity recognition and relationship extraction are carried out by using BiLSTM-CRF model, and the construction of knowledge graph is completed. Finally, the knowledge is stored and displayed visually by using graph database neo4j. The combination of knowledge graph and hardware Trojan security field can summarize the existing detection technologies, provide a basis for the analysis of hardware Trojans, vigorously promote the energy Internet security construction, and steadily enhance the energy Internet active defense capability.
More
Translated text
Key words
Hardware Trojan horse detection,knowledge graph,Fisher BiLSTM-CRF model
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined