共 50 条
- [1] Hardware Security: Threat Models and Metrics [J]. 2013 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2013, : 819 - 823
- [2] A Primer on Hardware Security: Models, Methods, and Metrics [J]. PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1283 - 1295
- [3] Security metrics for power based SCA resistant hardware implementation [J]. 2016 29TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2016 15TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2016, : 541 - 546
- [4] Analysis and Prioritization of Design Metrics [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 1495 - 1504
- [6] PRIORITIZATION OF IT SECURITY ACTIVITIES [J]. INDUSTRIAL REVOLUTIONS, FROM THE GLOBALIZATION AND POST-GLOBALIZATION PERSPECTIVE, VOL V: ECONOMIC INFORMATION TECHNOLOGY IN THE AVANT-GARDE OF CHANGE, 2009, : 138 - 143
- [7] Prioritization of Stakeholder Value Using Metrics [J]. EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, 2011, 230 : 74 - 88
- [9] Test Case Prioritization with Textual Comparison Metrics [J]. 2015 9TH MALAYSIAN SOFTWARE ENGINEERING CONFERENCE (MYSEC2015), 2015, : 7 - 12