Login / Signup
Hardware Patching Methodology for Neutralizing Timing Hardware Trojans Using Vulnerability Analysis and Time Borrowing Scheme.
Fatemeh Khormizi
Ahmad Shabani
Bijan Alizadeh
Published in:
IEEE Trans. Circuits Syst. II Express Briefs (2022)
Keyphrases
</>
real time
low cost
vlsi implementation
hardware and software
protection scheme
personal computer
computing systems
high speed
computer systems
hardware implementation
parallel hardware
hardware architecture
embedded systems
data sets
low power
website
field programmable gate array
graphics hardware
information systems
information retrieval
hardware software
data mining