A survey of hardware Trojan threat and defense.
He LiQiang LiuJiliang ZhangPublished in: Integr. (2016)
Keyphrases
- real time
- hardware and software
- intrusion detection
- low cost
- image processing
- computer systems
- advanced research projects agency
- field programmable gate array
- evolutionary algorithm
- network security
- computing systems
- computing power
- hardware design
- data sets
- data processing
- parallel hardware
- standard pc
- digital circuits
- hardware architecture
- genetic algorithm
- countermeasures
- hardware implementation
- personal computer
- social networks
- computer networks