A security method of hardware Trojan detection using path tracking algorithm
Crossref DOI link: https://doi.org/10.1186/s13638-022-02165-9
Published Online: 2022-09-05
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Huang, Der-Chen
Hsiao, Chun-Fang
Chang, Tin-Wei
Chu, Ying-Yi
Text and Data Mining valid from 2022-09-05
Version of Record valid from 2022-09-05
Article History
Received: 3 June 2022
Accepted: 25 August 2022
First Online: 5 September 2022
Declarations
:
: The authors declare that they have no competing interests.