Login / Signup
Hardware Trojan Attacks: Threat Analysis and Countermeasures.
Swarup Bhunia
Michael S. Hsiao
Mainak Banga
Seetharam Narasimhan
Published in:
Proc. IEEE (2014)
Keyphrases
</>
countermeasures
information security
java card
power analysis
low cost
real time
cyber attacks
security measures
data acquisition
differential power analysis
risk analysis
intrusion detection
knowledge discovery
data analysis
decision making
information systems
databases