An Efficient Technique to Detect Stealthy Hardware Trojans Independent of the Trigger Size.
Seyed Mohammad SebtAhmad PatooghyHakem BeitollahiPublished in: J. Electron. Test. (2019)
Keyphrases
- low cost
- automatic detection
- real time
- detection algorithm
- hardware and software
- memory size
- computing power
- website
- computer systems
- internal memory
- scales linearly
- hardware architecture
- computing systems
- highly efficient
- embedded systems
- standard deviation
- multiscale
- image processing
- information systems
- search engine
- information retrieval
- neural network