Detecting Hardware Trojan through Time Domain Constrained Estimator Based Unified Subspace Technique

By: Material type: ArticleArticleDescription: 606-609 pSubject(s): In: IEICE Transactions on Information and Systems
Holdings
Item type Current library Call number Vol info Status Date due Barcode
Articles Articles Periodical Section Vol.E97-D, No.03 (Mar. 2014) Available

Visit counter For Websites

Copyright © 
Engr Abul Kalam Library, NEDUET, 2024