From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Vulnerability-Aware Energy Optimization for Reconfigurable Caches in Multitasking Systems., и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 38 (5): 809-821 (2019)Trace Buffer Attack on the AES Cipher., и . J. Hardw. Syst. Secur., 1 (1): 68-84 (2017)Vulnerability-Aware Energy Optimization Using Reconfigurable Caches in Multicore Systems., и . ICCD, стр. 241-248. IEEE Computer Society, (2017)An automated configurable Trojan insertion framework for dynamic trust benchmarks., , , и . DATE, стр. 1598-1603. IEEE, (2018)Cache Reconfiguration Using Machine Learning for Vulnerability-aware Energy Optimization., , и . ACM Trans. Embed. Comput. Syst., 18 (2): 15:1-15:24 (2019)Trace Buffer Attack: Security versus observability study in post-silicon debug., , и . VLSI-SoC, стр. 355-360. IEEE, (2015)Vulnerability-aware Dynamic Reconfiguration of Partially Protected Caches., и . ISQED, стр. 255-260. IEEE, (2020)MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection., , и . CCS, стр. 130-141. ACM, (2016)Scalable Test Generation for Trojan Detection Using Side Channel Analysis., , и . IEEE Trans. Inf. Forensics Secur., 13 (11): 2746-2760 (2018)Trojan localization using symbolic algebra., , и . ASP-DAC, стр. 591-597. IEEE, (2017)