Fingerprint
Dive into the research topics of 'Advanced techniques for designing stealthy hardware trojans'. Together they form a unique fingerprint.- Sort by
- Weight
- Alphabetically
Nektarios Georgios Tsoutsos, Charalambos Konstantinou, Michail Maniatakos
Research output: Chapter in Book/Report/Conference proceeding › Conference contribution