Cited By
View all- Krieg CRathmair MSchupfer F(2014)A Process for the Detection of Design-Level Hardware Trojans Using Verification MethodsProceedings of the 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS)10.1109/HPCC.2014.112(729-734)Online publication date: 20-Aug-2014
- Höller AKajtazovic NPreschern CKreiner C(2014)Formal Fault Tolerance Analysis of Algorithms for Redundant Systems in Early Design StagesSoftware Engineering for Resilient Systems10.1007/978-3-319-12241-0_6(71-85)Online publication date: 2014