共 19 条
- [1] Hardware Trojan Attacks: Threat Analysis and Countermeasures [J]. PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1229 - 1247
- [2] Faezi S, 2021, PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), P1484, DOI 10.23919/DATE51398.2021.9474076
- [3] Guntur H, 2014, 2014 IEEE 3RD GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), P271, DOI 10.1109/GCCE.2014.7031104
- [6] Golden-Free Hardware Trojan Detection with High Sensitivity Under Process Noise [J]. JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2017, 33 (01): : 107 - 124
- [9] Morioka S, 2002, LECT NOTES COMPUT SC, V2523, P172
- [10] Refaeilzadeh P., 2009, Encyclopedia of Database Systems, P532, DOI [10.1007/978-0-387-39940-9_565, DOI 10.1007/978-0-387-39940-9_565]