Author:
Stone Samuel J.,Temple Michael A.,Baldwin Rusty O.
Subject
Information Systems and Management,Computer Science Applications,Safety, Risk, Reliability and Quality,Modelling and Simulation
Reference35 articles.
1. D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi and B. Sunar, Trojan detection using IC fingerprinting, Proceedings of the IEEE Symposium on Security and Privacy, pp. 296–310, 2007.
2. C. Aguayo Gonzalez and J. Reed, Detecting unauthorized software execution in SDR using power fingerprinting, Proceedings of the Military Communications Conference, pp. 2211–2216, 2010.
3. C. Aguayo Gonzalez and J. Reed, Power fingerprinting in SDR integrity assessment for security and regulatory compliance, Analog Integrated Circuits and Signal Processing, vol. 69(2–3), pp. 307–327, 2011.
4. W. Baranski, A. Wytyczak-Partyka and T. Walkowiak, Computational Complexity Reduction in PCA-Based Face Recognition, Technical Report, Institute of Computer Engineering, Control and Robotics, Wroclaw University of Technology, Wroclaw, Poland, 2007.
5. G. Bush, Homeland Security Presidential Directive 7, The White House, Washington, DC, 2003.
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献