共 34 条
- [2] [Anonymous], 2010, P 2010 IEEE INT WORK
- [3] [Anonymous], 2012, Optimal Estimation of Dynamic Systems
- [6] Bilzor M., 2012, Proceedings 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2012), P49, DOI 10.1109/HST.2012.6224318
- [7] Forte D, 2013, ICCAD-IEEE ACM INT, P532, DOI 10.1109/ICCAD.2013.6691167
- [8] System level leakage reduction considering the interdependence of temperature and leakage [J]. 41ST DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2004, 2004, : 12 - 17
- [9] Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically [J]. 2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 159 - 172
- [10] Hu KQ, 2013, DES AUT TEST EUROPE, P1271