Publisher
Springer International Publishing
Reference11 articles.
1. Adee, S.: The hunt for the kill switch. IEEE Spectr. 45(5), 34–39 (2008)
2. BBC: Huawei offers access to source code and equipment.
http://www.bbc.com/news/business-20053511
3. Bhunia, S., Hsiao, M.S., Banga, M., Narasimhan, S.: Hardware trojan attacks: threat analysis and countermeasures. Proc. IEEE 102(8), 1229–1247 (2014)
4. Danezis, G.: Trust as a methodological tool in security engineering. Trust, Computing, and Society, vol. 68 (2014)
5. The Intercept: CIA campaign steal apples secrets.
https://theintercept.com/2015/03/10/ispy-cia-campaign-steal-apples-secrets/