Author of the publication

Blue team red team approach to hardware trust assessment.

, , and . ICCD, page 285-288. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intra-die process variation aware anomaly detection in FPGAs., , and . ITC, page 1-6. IEEE Computer Society, (2014)Design and analysis of ring oscillator based Design-for-Trust technique., , , and . VTS, page 105-110. IEEE Computer Society, (2011)TAINT: Tool for Automated INsertion of Trojans., , , and . ICCD, page 545-548. IEEE Computer Society, (2017)Blue team red team approach to hardware trust assessment., , and . ICCD, page 285-288. IEEE Computer Society, (2011)FPGA Trust Zone: Incorporating trust and reliability into FPGA designs., , , and . ICCD, page 600-605. IEEE Computer Society, (2016)Deep Packet Field Extraction Engine (DPFEE): A pre-processor for network intrusion detection and denial-of-service detection systems., , and . ICCD, page 266-272. IEEE Computer Society, (2015)DPFEE: A High Performance Scalable Pre-Processor for Network Security Systems., , and . IEEE Trans. Multi Scale Comput. Syst., 4 (1): 55-68 (2018)BRAIN: BehavioR Based Adaptive Intrusion Detection in Networks: Using Hardware Performance Counters to Detect DDoS Attacks., , , and . VLSID, page 587-588. IEEE Computer Society, (2016)Fingerprinting Field Programmable Gate Arrays., , , and . ICCD, page 337-340. IEEE Computer Society, (2017)