Targeted modification of hardware trojans.
Jason R. HamletJackson R. MayoVivian KammlerPublished in: J. Hardw. Syst. Secur. (2019)
Keyphrases
- low cost
- hardware and software
- computer systems
- real time
- hardware implementation
- massively parallel
- image processing
- graphics hardware
- computing power
- parallel hardware
- standard pc
- dedicated hardware
- hardware architecture
- field programmable gate array
- computing systems
- embedded systems
- database systems
- decision trees
- information systems
- databases