Login / Signup
Hardware Trojan Prevention Through Limiting Access to the Active Region.
Tareq Muhammad Supon
Mahsasadat Seyedbarhagh
Rashid Rashidzadeh
Roberto Muscedere
Published in:
DTIS (2019)
Keyphrases
</>
low cost
hardware and software
real time
access control
neural network
input image
hardware implementation
computing power
data structure
data sets
hardware design
central processor
data processing
database
computer systems
wireless networks
computational power