Author:
Liakos Konstantinos G,Georgakilas Georgios K,Moustakidis Serafeim,Sklavos Nicolas,Plessas Fotis C
Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Software
Reference76 articles.
1. Protection against hardware trojan attacks: towards a comprehensive solution;Bhunia;IEEE Des. Test,2013
2. The Trojan-proof chip;Mitra;IEEE Spectr.,2015
3. Hardware Security and Trust;Sklavos,2017
4. Hardware Trojan detection using path delay fingerprint;Jin,2008
5. M.Potkonjak, A.Nahapetian, M.Nelson, and T.Massey, “Hardware Trojan horse detection using gate-level characterization,” 2009, doi: 10.1145/1629911.1630091.
Cited by
38 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献