Art
J-GLOBAL ID:201802265723423881   Reference number:18A0728412

A hardware-Trojan classification method utilizing boundary net structures

境界ネット構造を用いたハードウェア-トロイ分類法【JST・京大機械翻訳】
Author (3):
Material:
Volume: 2018  Issue: ICCE  Page: 1-4  Publication year: 2018 
JST Material Number: W2441A  Document type: Proceedings
Article type: 原著論文  Country of issue: United States (USA)  Language: ENGLISH (EN)
Abstract/Point:
Abstract/Point
Japanese summary of the article(about several hundred characters).
All summary is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
Recently, cybersecurity has be...
   To see more with JDream III (charged).   {{ this.onShowAbsJLink("http://jdream3.com/lp/jglobal/index.html?docNo=18A0728412&from=J-GLOBAL&jstjournalNo=W2441A") }}
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
, 【Automatic Indexing@JST】
JST classification (2):
JST classification
Category name(code) classified by JST.
Data protection  ,  Electric power system in general 
Terms in the title (4):
Terms in the title
Keywords automatically extracted from the title.

Return to Previous Page