Login / Signup
EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor.
Naofumi Homma
Yu-ichi Hayashi
Noriyuki Miura
Daisuke Fujimoto
Daichi Tanaka
Makoto Nagata
Takafumi Aoki
Published in:
IACR Cryptol. ePrint Arch. (2014)
Keyphrases
</>
design methodology
expectation maximization
em algorithm
real time
mixture model
real world
maximum likelihood
design process
neural network
design criteria
data mining
web services
formal specification
design procedure