共 35 条
- [1] [Anonymous], 2017, J. Hardw. Syst. Security, P85, DOI DOI 10.1007/S41635-017-0001-6
- [2] Hardware Trust through Layout Filling: a Hardware Trojan Prevention Technique [J]. 2016 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2016, : 254 - 259
- [3] Innovations in IoT for a Safe, Secure, and Sustainable Future [J]. GLSVLSI '19 - PROCEEDINGS OF THE 2019 ON GREAT LAKES SYMPOSIUM ON VLSI, 2019, : 7 - 7
- [4] Hardware Trojan Attacks: Threat Analysis and Countermeasures [J]. PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1229 - 1247
- [5] Leveraging Emerging Technology for Hardware Security - Case Study on Silicon Nanowire FETs and Graphene SymFETs [J]. 2014 IEEE 23RD ASIAN TEST SYMPOSIUM (ATS), 2014, : 342 - 347
- [6] Game and Information Theory Analysis of Electronic Countermeasures in Pursuit-Evasion Games [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2008, 38 (06): : 1281 - 1294
- [7] Chang M, 2017, INT C REHAB ROBOT, P369, DOI 10.1109/ICORR.2017.8009275
- [8] Circuit Camouflage Integration for Hardware IP Protection [J]. 2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
- [9] An Unsupervised Detection Approach for Hardware Trojans [J]. IEEE ACCESS, 2020, 8 : 158169 - 158183
- [10] A Locating Method for Multi-Purposes HTs Based on the Boundary Network [J]. IEEE ACCESS, 2019, 7 : 110936 - 110950