![](https://cdn.standaardboekhandel.be/product/9789493409682/front-medium-2209550642.jpg?w=300)
Provides a comprehensive vulnerability analysis across the integrated circuits design flow
Introduces security metrics to measure quantitatively the vulnerability of a circuit to hardware Trojan insertion
Describes design techniques to prevent hardware Trojan insertion and to facilitate hardware Trojan detection
Presents testing techniques for trustworthiness at each circuit level
We publiceren alleen reviews die voldoen aan de voorwaarden voor reviews. Bekijk onze voorwaarden voor reviews.