Subject
Law,General Computer Science
Reference73 articles.
1. Detecting trojans through leakage current analysis using multiple supply pad iddqs;Aarestad;IEEE Trans. Inf. Forensics Secur.,2010
2. Sgx-ssd: A policy-based versioning ssd with intel sgx;Ahn;arXiv,2020
3. Rijid: random code injection to mask power analysis based side channel attacks;Ambrose,2007
4. An empirical analysis of software vendors’ patch release behavior: impact of vulnerability disclosure;Arora;Information Systems Research,2010
5. Identifying vulnerabilities in the supply chain;Barroso,2009
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献