Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Cynthia Sturton
Identifying Security Critical Properties for the Dynamic Verification of a Processor
ACM SIGPLAN Notices
Computer Science
Defeating UCI: Building Stealthy and Malicious Hardware
Related publications
Development and Verification of the Direct Impact Methodfor Identifying Viscoplastic Properties of Materialsin Experiments on a Gas Dynamic Vertical Test Stand
Problems of Strength and Plasticity
Tools for Local Critical Infrastructure Protection: Computational Support for Identifying Safety and Security Interdependencies Between Local Critical Infrastructures
A Dynamic Scaling FFT Processor for DVB-T Applications
IEEE Journal of Solid-State Circuits
Electronic Engineering
Electrical
Safety-Critical Java on a Java Processor
Formal Verification of Security Properties of Smart Card Embedded Source Code
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Verification of Security Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Verification of Security Protocols
A Digit Pipelined Dynamic Time Warp Processor.
Malicious Processor Detection Based on the Security Agent
International Journal of Security and its Applications
Computer Science