Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Software
Reference34 articles.
1. A Review on Hardware Security Countermeasures for IoT: Emerging Mechanisms and Machine Learning Solutions;Michailidis;ACM Int. Conf. Proceeding Ser.,2020
2. Timestamp Scheme to Mitigate Replay Attacks in Secure ZigBee Networks;Farha;IEEE Trans. Mob. Comput.,2022
3. MAGLeak: A Learning-Based Side-Channel Attack for Password Recognition with Multiple Sensors in IIoT Environment;Chen;IEEE Trans. Ind. Informatics.,2022
4. A Hardware Trojan Attack on FPGA-Based Cryptographic Key Generation: Impact and Detection;Govindan;J. Hardw. Syst. Secur.,2018
5. PMTP: A MAX-SAT-Based Approach to Detect Hardware Trojan Using Propagation of Maximum Transition Probability;Shabani;IEEE Trans. Comput. Des. Integr. Circuits Syst.,2020
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献