共 31 条
[1]
[Anonymous], 2010, IEEE DESIGN TEST COM
[2]
A region based approach for the identification of hardware Trojans
[J].
2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST,
2008,
:40-47
[3]
Barrantes E. G., 2005, ACM Transactions on Information and Systems Security, V8, P3, DOI 10.1145/1053283.1053286
[4]
Bertholon Benoit, 2013, 2013 IEEE International Symposium on Parallel and Distributed Processing, Workshops and PhD Forum (IPDPSW), P435, DOI 10.1109/IPDPSW.2013.234
[5]
Bhunia S., 2017, HARDWARE TROJAN WAR
[6]
OS Support for Detecting Trojan Circuit Attacks
[J].
2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST,
2009,
:100-103
[7]
Chong F., 2009, NITRD PROGRAM
[8]
Dubey JP, 2014, TOXOPLASMA GONDII: THE MODEL APICOMPLEXAN - PERSPECTIVES AND METHODS, 2ND EDITION, P1, DOI 10.1016/B978-0-12-396481-6.00001-5
[9]
Dupuis S, 2014, IEEE INT ON LINE, P49, DOI 10.1109/IOLTS.2014.6873671
[10]
Ferraiuolo A, 2012, ICCAD-IEEE ACM INT, P37