共 11 条
[1]
Chhetri S. R., 2016, POSTER EXPLOITING AC
[2]
Gholap Jay, 2012, ASIAN J COMPUTER SCI, V2
[4]
Jia H., 2004, ICPR 2004 P 17 INT C, V3, P239
[5]
Murty MN, 2011, PATTERN RECOGNITION
[6]
Patil T.R., 2013, International Journal of Computer Science and Applications, V6, P256
[8]
Sturm Logan D., 2014, INT SOL FREEF FABR S, P951
[10]
Trojan Detection and Side-Channel Analyses for Cyber-Security in Cyber-Physical Manufacturing Systems
[J].
43RD NORTH AMERICAN MANUFACTURING RESEARCH CONFERENCE, NAMRC 43,
2015, 1
:77-85