Login / Signup
Runtime hardware Trojan monitors through modeling burst mode communication using formal verification.
Faiq Khalid
Syed Rafay Hasan
Osman Hasan
Falah R. Awwad
Published in:
Integr. (2018)
Keyphrases
</>
formal verification
model checking
low cost
hardware and software
model checker
symbolic model checking
real time
image processing
automated verification
communication networks
bounded model checking
open source
computer systems
communication systems
communication protocol