Login / Signup
Layout Vulnerability Reduction against Trojan Insertion Using Security-Aware White Space Distribution.
Hamed Hossein-Talaee
Ali Jahanian
Published in:
ISVLSI (2017)
Keyphrases
</>
security vulnerabilities
risk assessment
space time
information security
taking care
network security
security requirements
buffer overflow
random variables
national security
data security
public health
cyber security
security analysis
database systems
access control
low dimensional
distributed systems