Cited By
View all- Vishwakarma RRezaei A(2023)Risk-Aware and Explainable Framework for Ensuring Guaranteed Coverage in Evolving Hardware Trojan Detection2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD)10.1109/ICCAD57390.2023.10323655(01-09)Online publication date: 28-Oct-2023
- Wehbe TMooney VInan OKeezer D(2018)Securing Medical Devices Against Hardware Trojan Attacks Through Analog-, Digital-, and Physiological-Based SignaturesJournal of Hardware and Systems Security10.1007/s41635-018-0040-72:3(251-265)Online publication date: 19-Jun-2018
- Lodhi FHasan SHasan OAwwadl F(2017)Power profiling of microcontroller's instruction set for runtime hardware trojans detection without golden circuit modelsProceedings of the Conference on Design, Automation & Test in Europe10.5555/3130379.3130447(294-297)Online publication date: 27-Mar-2017
- Show More Cited By