Results 181 to 190 of about 9,623 (197)
Some of the next articles are maybe not open access.
Hardware Trojans - detective countermeasure against HLS-based hardware Trojan attack
Anirban Sengupta, Mahendra Rathoropenaire +1 more source
Hardware Trojan Detection Using Reconfigurable Assertion Checkers
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2019Uthman Alsaiari, Fayez Gebali
exaly
Activity Factor Based Hardware Trojan Detection and Localization
Journal of Electronic Testing: Theory and Applications (JETTA), 2019Yongkang Tang, Liang Fang
exaly
Layout-Aware Switching Activity Localization to Enhance Hardware Trojan Detection
IEEE Transactions on Information Forensics and Security, 2012Hassan Salmani
exaly
A study on the efficiency of hardware Trojan detection based on path-delay fingerprinting
Microprocessors and Microsystems, 2014Arash Nejat, Morteza Saheb Zamani
exaly
Introduction to Hardware Trojan Detection Methods
Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015, 2015Julien Francq, Florian Frick
openaire +1 more source
On Reverse Engineering-Based Hardware Trojan Detection
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2016Chongxi Bao, Domenic Forte
exaly

