共 10 条
- [3] Hazari NA, 2017, PROC NAECON IEEE NAT, P362, DOI 10.1109/NAECON.2017.8268803
- [4] Karam R., 2016, P INT C RECONFIGURAB, P1
- [6] Majzoobi M, 2012, INTRODUCTION TO HARDWARE SECURITY AND TRUST, P195, DOI 10.1007/978-1-4419-8080-9_9
- [7] Moradi A, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P111
- [8] Pundir N, 2017, PROC NAECON IEEE NAT, P84, DOI 10.1109/NAECON.2017.8268749
- [9] A Survey of Hardware Trojan Taxonomy and Detection [J]. IEEE DESIGN & TEST OF COMPUTERS, 2010, 27 (01): : 10 - 25