A survey on hardware trojan detection techniques. Bhasin, S. & Regazzoni, F. In 2015 IEEE International Symposium on Circuits and Systems, ISCAS 2015, Lisbon, Portugal, May 24-27, 2015, pages 2021–2024, 2015. IEEE. Paper doi bibtex @inproceedings{DBLP:conf/iscas/BhasinR15,
author = {Shivam Bhasin and
Francesco Regazzoni},
title = {A survey on hardware trojan detection techniques},
booktitle = {2015 {IEEE} International Symposium on Circuits and Systems, {ISCAS}
2015, Lisbon, Portugal, May 24-27, 2015},
pages = {2021--2024},
publisher = {{IEEE}},
year = {2015},
url = {https://doi.org/10.1109/ISCAS.2015.7169073},
doi = {10.1109/ISCAS.2015.7169073},
timestamp = {Tue, 31 Mar 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/iscas/BhasinR15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"KyamzhAWTrqFF8obc","bibbaseid":"bhasin-regazzoni-asurveyonhardwaretrojandetectiontechniques-2015","author_short":["Bhasin, S.","Regazzoni, F."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Shivam"],"propositions":[],"lastnames":["Bhasin"],"suffixes":[]},{"firstnames":["Francesco"],"propositions":[],"lastnames":["Regazzoni"],"suffixes":[]}],"title":"A survey on hardware trojan detection techniques","booktitle":"2015 IEEE International Symposium on Circuits and Systems, ISCAS 2015, Lisbon, Portugal, May 24-27, 2015","pages":"2021–2024","publisher":"IEEE","year":"2015","url":"https://doi.org/10.1109/ISCAS.2015.7169073","doi":"10.1109/ISCAS.2015.7169073","timestamp":"Tue, 31 Mar 2020 01:00:00 +0200","biburl":"https://dblp.org/rec/conf/iscas/BhasinR15.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/iscas/BhasinR15,\n author = {Shivam Bhasin and\n Francesco Regazzoni},\n title = {A survey on hardware trojan detection techniques},\n booktitle = {2015 {IEEE} International Symposium on Circuits and Systems, {ISCAS}\n 2015, Lisbon, Portugal, May 24-27, 2015},\n pages = {2021--2024},\n publisher = {{IEEE}},\n year = {2015},\n url = {https://doi.org/10.1109/ISCAS.2015.7169073},\n doi = {10.1109/ISCAS.2015.7169073},\n timestamp = {Tue, 31 Mar 2020 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/iscas/BhasinR15.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Bhasin, S.","Regazzoni, F."],"key":"DBLP:conf/iscas/BhasinR15","id":"DBLP:conf/iscas/BhasinR15","bibbaseid":"bhasin-regazzoni-asurveyonhardwaretrojandetectiontechniques-2015","role":"author","urls":{"Paper":"https://doi.org/10.1109/ISCAS.2015.7169073"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/f/QK7udauu9oYiG86Rs/bib.bib","dataSources":["H8x2obrhjRLyjakpF","ZuojF5jycEf8Xjgko","8gxn7AaKRh7GxNQNx","9LEB4ahCAz8Pkq58E","ZsvDCPRnhBRRCnWQ5"],"keywords":[],"search_terms":["survey","hardware","trojan","detection","techniques","bhasin","regazzoni"],"title":"A survey on hardware trojan detection techniques","year":2015}