共 50 条
- [31] A hitchhiker's guide to the Trojan Horse Method [J]. 8TH EUROPEAN SUMMER SCHOOL ON EXPERIMENTAL NUCLEAR ASTROPHYSICS (SANTA TECLA SCHOOL), 2016, 703
- [32] STANDARD OIL AS LOCHNER'S TROJAN HORSE [J]. SOUTHERN CALIFORNIA LAW REVIEW, 2012, 85 (03) : 783 - 813
- [33] On the Effectiveness of Hardware Trojan Horse Detection via Side-Channel Analysis [J]. INFORMATION SECURITY JOURNAL, 2013, 22 (5-6): : 226 - 236
- [34] Hardware Trojan Horse Benchmark via Optimal Creation and Placement of Malicious Circuitry [J]. 2012 49TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2012, : 90 - 95
- [35] Verification and Detection of a Wireless-Leakage Hardware Trojan Horse with Covert Channels [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY, 2016, 47 : 111 - 114