A Novel Approach to Detect Hardware Trojan Attacks on Primary Data Inputs.
Taimour WehbeVincent John MooneyDavid C. KeezerNicholas B. ParhamPublished in: WESS (2015)
Keyphrases
- data sets
- data analysis
- database
- raw data
- computer systems
- data processing
- data distribution
- data collection
- end users
- high quality
- data sources
- missing data
- data acquisition
- training data
- data points
- image data
- input data
- xml documents
- access control
- data structure
- statistical analysis
- synthetic data
- experimental data
- computational power