共 31 条
[1]
Trojan detection using IC fingerprinting
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:296-+
[2]
[Anonymous], MICHIGAN STATE LAW R
[3]
[Anonymous], 2014, P 4 PROGRAM PROTECTI
[4]
[Anonymous], 2014, TENN LAW REV
[5]
[Anonymous], 2016, P 35 INT C COMP AID
[6]
[Anonymous], 30 ANN COMP SEC APPL
[7]
Bayens C, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1181
[8]
Belikovetsky S., 2017, Proceedings of the 11th USENIX Conference on Offensive Technologies, USENIX Association, Vancouver, BC, Canada, P1
[9]
LEGAL ASPECTS OF PROTECTING INTELLECTUAL PROPERTY IN ADDITIVE MANUFACTURING
[J].
CRITICAL INFRASTRUCTURE PROTECTION X,
2016, 485
:63-79
[10]
A review of audio fingerprinting
[J].
JOURNAL OF VLSI SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY,
2005, 41 (03)
:271-284