iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/DDECS.2016.7482481
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:00:03Z","timestamp":1729648803894,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/ddecs.2016.7482481","type":"proceedings-article","created":{"date-parts":[[2016,6,2]],"date-time":"2016-06-02T13:06:31Z","timestamp":1464872791000},"page":"1-6","source":"Crossref","is-referenced-by-count":20,"title":["Efficient triggering of Trojan hardware logic"],"prefix":"10.1109","author":[{"given":"Artemios G.","family":"Voyiatzis","sequence":"first","affiliation":[]},{"given":"Kyriakos G.","family":"Stefanidis","sequence":"additional","affiliation":[]},{"given":"Paris","family":"Kitsos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.15"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2014.74"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISVDAT.2015.7208064"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2015.7059101"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DTIS.2015.7127362"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_28"},{"key":"ref16","first-page":"266","article-title":"A practical test patterns generation technique for hardware Trojan detection","volume":"80","author":"fand","year":"2013","journal-title":"Elektrotehniki vestnik"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2093547"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1166\/jolpe.2012.1225"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2754896"},{"journal-title":"European Network and Information Security (NIS) Platform","article-title":"Cyberse-curity Strategic Research Agenda - SRA","year":"2015","key":"ref4"},{"key":"ref3","first-page":"1","article-title":"Supply chain risk management practices for federal information systems and organizations","volume":"800","author":"boyens","year":"2014","journal-title":"NIST Special Publication"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2014.45"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2008.4505310"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2015.05.003"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MECO.2014.6862687"},{"journal-title":"US House of Representatives","article-title":"Investigative Report on the US National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE: A Report","year":"2012","author":"rogers","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2015.05.002"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381800"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590325"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2013.50"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_18"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_15"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.1102"}],"event":{"name":"2016 IEEE 19th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS)","start":{"date-parts":[[2016,4,20]]},"location":"Kosice, Slovakia","end":{"date-parts":[[2016,4,22]]}},"container-title":["2016 IEEE 19th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7480193\/7482431\/07482481.pdf?arnumber=7482481","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T20:24:04Z","timestamp":1475180644000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7482481\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ddecs.2016.7482481","relation":{},"subject":[],"published":{"date-parts":[[2016,4]]}}}