1
TÍTULO: IC Protection Against JTAG-Based Attacks  Full Text
AUTORES: Xuanle L Ren; Francisco Pimentel Torres; Blanton, RD; Vitor Grade Tavares ;
PUBLICAÇÃO: 2019, FONTE: IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOLUME: 38, NÚMERO: 1
INDEXADO EM: Scopus WOS CrossRef: 4
2
TÍTULO: Detection of IJTAG Attacks Using LDPC-based Feature Reduction and Machine Learning
AUTORES: Xuanle L Ren; (Shawn) D S Blanton; Vitor Grade Tavares ;
PUBLICAÇÃO: 2018, FONTE: 23rd IEEE European Test Symposium (ETS) in 2018 23RD IEEE EUROPEAN TEST SYMPOSIUM (ETS), VOLUME: 2018-May
INDEXADO EM: Scopus WOS CrossRef
3
TÍTULO: Detection of Illegitimate Access to JTAG via Statistical Learning in Chip
AUTORES: Xuanle L Ren; Vitor Grade Tavares ; (Shawn) D Blanton;
PUBLICAÇÃO: 2015, FONTE: Conference on Design Automation Test in Europe (DATE) in 2015 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), VOLUME: 2015-April
INDEXADO EM: Scopus WOS