@dblp

Detection of Trojan HW by using hidden information on the system.

, , and . IOLTS, page 192-193. IEEE Computer Society, (2011)

Links and resources

Tags