共 50 条
- [1] Changepoint-based Anomaly Detection in a Core Router System [J]. 2017 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2017,
- [3] A Survey on Hardware Trojan Detection Techniques [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2015, : 2021 - 2024
- [4] Review on Hardware Trojan Detection Techniques [J]. National Academy Science Letters, 2023, 46 : 521 - 524
- [5] Classification of Hardware Trojan Detection Techniques [J]. 2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 357 - 362
- [6] Review on Hardware Trojan Detection Techniques [J]. NATIONAL ACADEMY SCIENCE LETTERS-INDIA, 2023, 46 (06): : 521 - 524
- [7] Using Path Features for Hardware Trojan Detection Based on Machine Learning Techniques [J]. 2023 24TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED, 2023, : 638 - 645
- [8] A method of hardware-trojan detection using design verification techniques [J]. Adv. Intell. Sys. Comput., (978-987):
- [9] A Method of Hardware-Trojan Detection Using Design Verification Techniques [J]. COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS, 2019, 772 : 978 - 987
- [10] Hardware Trojan Detection Techniques Using Side-Channel Analysis [J]. PROCEEDINGS OF 2019 6TH NATIONAL FOUNDATION FOR SCIENCE AND TECHNOLOGY DEVELOPMENT (NAFOSTED) CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2019, : 528 - 533