A Graph Theory Approach towards IJTAG Security via Controlled Scan Chain Isolation.
Abhishek DasNur A. ToubaPublished in: VTS (2019)
Keyphrases
- graph theory
- graph theoretical
- computer vision and pattern recognition
- automata theory
- social network analysis
- information security
- graph theoretic
- complex networks
- maximum independent set
- access control
- security policies
- minimum spanning tree
- intrusion detection
- security issues
- graph based representations
- protein structure prediction
- security requirements
- multi objective
- computer vision
- genetic algorithm
- neural network
- constraint satisfaction problems
- maximal cliques
- clustering coefficient
- objective function
- network properties