An Efficient Technique to Detect Stealthy Hardware Trojans Independent of the Trigger Size
Crossref DOI link: https://doi.org/10.1007/s10836-019-05848-2
Published Online: 2019-12-18
Published Print: 2019-12
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Sebt, S. M.
Patooghy, A.
Beitollahi, H. http://orcid.org/0000-0002-8420-6545
Text and Data Mining valid from 2019-12-01
Version of Record valid from 2019-12-01
Article History
Received: 12 May 2019
Accepted: 4 December 2019
First Online: 18 December 2019