Cited By
View all- Hou JLiu ZYang ZYang C(2024)Hardware Trojan Attacks on the Reconfigurable Interconnections of Field-Programmable Gate Array-Based Convolutional Neural Network Accelerators and a Physically Unclonable Function-Based Countermeasure Detection TechniqueMicromachines10.3390/mi1501014915:1(149)Online publication date: 19-Jan-2024
- Moyle SMartin AAllott N(2024)XAI Human-Machine collaboration applied to network securityFrontiers in Computer Science10.3389/fcomp.2024.13212386Online publication date: 13-May-2024
- Gal‐Or EHydari MTelang R(2024)Merchants of Vulnerabilities: How Bug Bounty Programs Benefit Software VendorsSSRN Electronic Journal10.2139/ssrn.4808742Online publication date: 2024
- Show More Cited By