Advanced Techniques for Designing Stealthy Hardware Trojans.
Nektarios Georgios TsoutsosCharalambos KonstantinouMichail ManiatakosPublished in: DAC (2014)
Keyphrases
- low cost
- hardware and software
- real time
- computer systems
- hardware implementation
- parallel hardware
- standard pc
- embedded systems
- personal computer
- web intelligence
- computing systems
- vlsi implementation
- information technology
- processing capabilities
- circuit design
- hardware architecture
- computing power
- data mining
- random number generator
- machine learning
- hardware design
- computer architecture
- information retrieval
- decision making
- image processing