Article citationsMore>>

Ren, X. (2015) Since an Attacker Will Use JTAG Differently from a Legitimate User, It Is Possible to Detect the Difference Using Machine-Learning Algorithms (Moni-toring JTAG Access Patterns).

has been cited by the following article:

Follow SCIRP
Twitter Facebook Linkedin Weibo
Contact us
customer@scirp.org
WhatsApp +86 18163351462(WhatsApp)
Click here to send a message to me 1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Copyright © 2006-2026 Scientific Research Publishing Inc. All Rights Reserved.
Top