共 50 条
- [31] Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2011, 27 (06): : 767 - 785
- [32] Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation Journal of Electronic Testing, 2011, 27 : 767 - 785
- [34] Formal Analysis of Vulnerabilities of Web Applications Based on SQL Injection SECURITY AND TRUST MANAGEMENT, STM 2016, 2016, 9871 : 179 - 195
- [36] Analysis of the Security Vulnerabilities of 2.5-D and 3-D Integrated Circuits PROCEEDINGS OF THE TWENTY THIRD INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2022), 2022, : 387 - 393
- [37] Side Channel Analysis of Hardware Trojan Based on Smooth Filtering Algorithm 2015 8TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 1, 2015, : 192 - 195
- [38] Analysis of the Security Vulnerabilities of 2.5-D and 3-D Integrated Circuits Proceedings - International Symposium on Quality Electronic Design, ISQED, 2022, 2022-April
- [39] An efficient methodology for hardware Trojan detection based on canonical correlation analysis MICROELECTRONICS JOURNAL, 2021, 115
- [40] An FPGA Hardware Trojan Detection Approach Based on Multiple Parameter Analysis 2018 21ST EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2018), 2018, : 516 - 522