共 13 条
- [1] Trojan detection using IC fingerprinting [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 296 - +
- [2] Enumeration of Nash equilibria for two-player games [J]. ECONOMIC THEORY, 2010, 42 (01) : 9 - 37
- [3] Hasegawa K, 2016, IEEE INT ON LINE, P203, DOI 10.1109/IOLTS.2016.7604700
- [4] Jin Y, 2008, 2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, P51, DOI 10.1109/HST.2008.4559049
- [5] A Game-Theoretic Approach for Testing for Hardware Trojans [J]. IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, 2016, 2 (03): : 199 - 210
- [6] Karunakaran DK, 2014, 2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT
- [7] Priyatharishini M, 2018, 2018 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRONICS, COMPUTERS AND COMMUNICATIONS (ICAECC)
- [8] A Survey of Hardware Trojan Taxonomy and Detection [J]. IEEE DESIGN & TEST OF COMPUTERS, 2010, 27 (01): : 10 - 25
- [9] Trusthub, About us