1. Trojan detection using ic fingerprinting;Agrawal;2007 IEEE Symposium on Security and Privacy (SP 07),2007
2. A survey on hardware trojan detection techniques;Bhasin;2015 IEEE International Symposium on Circuits and Systems (ISCAS),2015
3. Lof: Identifying density-based local outliers;Breunig,2000
4. Correlation power analysis with a leakage model;Brier,2004
5. A survey of data mining and machine learning methods for cyber security intrusion detection;Buczak;IEEE Commun. Surveys Tutorials,2015