Author:
Guha Krishnendu,Saha Sangeet,Chakrabarti Amlan
Publisher
Springer International Publishing
Reference29 articles.
1. H.A.M. Amin, Y. Alkabani, G.M.I. Selim, System-level protection and hardware Trojan detection using weighted voting. J. Adv. Res. 5(4), 499–505 (2014)
2. S. Bhunia, M.S. Hsiao, M. Banga, S. Narasimhan, Hardware trojan attacks: threat analysis and countermeasures. Proc. IEEE 102(8), 1229–1247 (2014)
3. C. Bolchini, A. Miele, Reliability-driven system-level synthesis for mixed-critical embedded systems. IEEE Trans. Comput. 62(12), 2489–2502 (2013)
4. S. Bhunia, M. Tehranipoor, Hardware Security—A Hands on Approach (Elsevier Morgan Kaufmann Publishers, 2018). ISBN: 9780128124772
5. M.-S. Bouguerra, D. Trystram, F. Wagner, Complexity analysis of checkpoint scheduling with variable costs. IEEE Trans. Comput. 62(6), 1269–1275 (2013)