共 11 条
[1]
[Anonymous], 1999, ANN INT CRYPT C
[2]
Boser B., TRAINING ALGORITHM O, P144
[4]
CORTES C, 1995, MACH LEARN, V20, P273, DOI 10.1023/A:1022627411411
[5]
Gonzalez C.R. A., 2009, MILCOM 2009-2009 IEEE Military Communications Conference, P1
[7]
DETECTING UNAUTHORIZED SOFTWARE EXECUTION IN SDR USING POWER FINGERPRINTING
[J].
MILITARY COMMUNICATIONS CONFERENCE, 2010 (MILCOM 2010),
2010,
:2211-2216
[8]
Mangard S., 2007, POWER ANAL ATTACKS R
[9]
Power analysis attacks and countermeasures
[J].
IEEE DESIGN & TEST OF COMPUTERS,
2007, 24 (06)
:535-543
[10]
Schölkopf B, 1999, ADVANCES IN KERNEL METHODS, P327