Author:
Saini Archit,Kundra Gahan,Kalra Shruti
Reference45 articles.
1. Bhunia S, Hsiao MS, Banga M, Narasimhan S (2014) Hardware trojan attacks: threat analysis and countermeasures. Proc IEEE 102(8):1229–1247
2. Ngo XT, Hoang VP, Le Duc H (2018, November) Hardware trojan threat and its countermeasures. In: 5th NAFOSTED conference on information and computer science (NICS). IEEE, pp 35–40
3. Wang SJ, Wei JY, Huang SH, Li KSM (2016, December) Test generation for combinational hardware trojans. In: 2016 IEEE Asian hardware-oriented security and trust (AsianHOST). IEEE, pp 1–6
4. Shende R, Ambawade DD (2016, July) A side channel based power analysis technique for hardware trojan detection using statistical learning approach. In: 2016 Thirteenth international conference on wireless and optical communications networks (WOCN). IEEE, pp 1–4
5. Sharifi E, Mohammadiasl K, Havasi M, Yazdani A (2015) Performance analysis of hardware trojan detection methods. Int J Open Inf Technol 3(5)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献