Cited By
View all- Cicirello V(2024)Evolutionary Computation: Theories, Techniques, and ApplicationsApplied Sciences10.3390/app1406254214:6(2542)Online publication date: 18-Mar-2024
- Jayasena ABachmann RMishra P(2024)EvilCS: An Evaluation of Information Leakage through Context Switching on Security Enclaves2024 Design, Automation & Test in Europe Conference & Exhibition (DATE)10.23919/DATE58400.2024.10546809(1-6)Online publication date: 25-Mar-2024
- Mulhem SEwert CNešković APoudel A(2024)Secure Software/Hardware Hybrid In-Field Testing for System-on-Chip2024 IFIP/IEEE 32nd International Conference on Very Large Scale Integration (VLSI-SoC)10.1109/VLSI-SoC62099.2024.10767817(1-6)Online publication date: 6-Oct-2024
- Show More Cited By