Login / Signup
Detecting malicious modifications of data in third-party intellectual property cores.
Jeyavijayan Rajendran
Vivekananda Vedula
Ramesh Karri
Published in:
DAC (2015)
Keyphrases
</>
privacy protection
sensitive information
third party
intellectual property
data providers
data mining
information systems
load balancing