[1] Goertzel K M.Integrated circuit security threats and hardware assurance countermeasures [J].Crosstalk Real-Time Information Assurance,2013,26(6):33-38.
[2] Bhunia S,Abramovici M,Agrawal D,et al.Protection against hardware Trojan attacks:towards a comprehensive solution [J].IEEE Design Test Computer,2013,30(3):6-17.
[3] Chakraborty R S,Narasimhan S,Bhunia S.Hardware trojan:threats and emerging solutions [A].Proceedings of the 2009 IEEE International High Level Design Validation and Test Workshop [C].San Francisco:IEEE,2009.166-171.
[4] Agrawal D,Baktir S,Karakoyunlu D,et al.Trojan detection using IC fingerprinting [A].Proceedings of the 2007 IEEE Symposium on Security and Privacy [C].Berkeley:IEEE,2007.296-310.
[5] 王力纬,罗宏伟,姚若河.基于旁路分析的硬件木马检测方法[J].华南理工大学学报(自然科学版),2012,40(6):6-10. Wang Li-wei,Luo Hong-wei,Yao Ruo-he.Side-channel analysis-based detection approach of hardware Trojans [J].Journal of South China University of Technology,2012,40(6):6-10.(in Chinese)
[6] 张鹏,王新成,周庆.基于电磁辐射信号分析的芯片硬件木马检测[J].电子学报,2014,42(2):122-126. Zhang Peng,Wang Xin-cheng,Zhou Qing.Hardware trojans detection based on electromagnetic emission signals analysis [J].Acta Electronica Sinica,2014,42(2):122-126.(in Chinese)
[7] Mangard S,Oswald E,Popp T.Power Analysis Attacks [M].Colorado:Springer Science & Bussiness Media,2010.
[8] 张学工.模式识别[M].北京:清华大学出版社,2010.
[9] 徐勇,张大鹏,杨健.模式识别中的核方法及其应用[M].北京:国防工业出版社,2010.
[10] Li H,Jiang T,Zhang K.Efficient and robust feature extraction by maximum margin criterion [J].IEEE Transactions on Neural Networks,2006,17(1):157-165.
[11] 盛骤,谢式千,潘承毅.概率论与数理统计[M].北京:高等教育出版社,2010.
[12] 毛莎莎.基于贪婪优化和投影变换的集成分类器算法研究[D].西安:西安电子科技大学,2014. Mao Sha-sha.A study of classifier ensemble methods based on greedy optimization and projection transformation [D].Xi'an:University of Electronic Science and Technology,2014.(in Chinese) |