Login / Signup
New testing procedure for finding insertion sites of stealthy hardware trojans.
Sophie Dupuis
Papa-Sidi Ba
Marie-Lise Flottes
Giorgio Di Natale
Bruno Rouzeyre
Published in:
DATE (2015)
Keyphrases
</>
low cost
website
integer arithmetic
real time
hardware and software
test cases
search engine
data mining
neural network
bayesian networks
real world
hardware implementation
computing power
iterative procedure
circuit design
vlsi implementation
databases