共 76 条
- [1] Alazab A, 2013, COMM COM INF SC, V381, P177
- [3] [Anonymous], 2016, P 2016 INT C INV COM
- [5] Auty Mike, 2015, Network Security, V2015, P13, DOI 10.1016/S1353-4858(15)30028-3
- [6] Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning [J]. IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (01): : 88 - 95
- [7] Bada M., 2014, Glob. Cyber Secur. Capacit. Cent
- [8] Banerjee U., 2010, Int. J. Comput. Appl., P1, DOI DOI 10.5120/1092-1427
- [9] Bhatia T, 2017, 2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), DOI 10.1109/CyberSecPODS.2017.8074847
- [10] Hardware Trojan Attacks: Threat Analysis and Countermeasures [J]. PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1229 - 1247