ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
1
views
0
references
Top references
cited by
3
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,039
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
Survey on recent counterfeit IC detection techniques and future research directions
Author(s):
Enahoro Oriero
,
Syed Rafay Hasan
Publication date
Created:
March 2019
Publication date
(Print):
March 2019
Journal:
Integration
Publisher:
Elsevier BV
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
BIO Integration
Author and article information
Journal
Title:
Integration
Abbreviated Title:
Integration
Publisher:
Elsevier BV
ISSN (Print):
01679260
Publication date Created:
March 2019
Publication date (Print):
March 2019
Article
DOI:
10.1016/j.vlsi.2019.02.006
SO-VID:
5e6e0e6d-5313-41a9-8716-d79b44bf53ab
Copyright ©
© 2019
License:
https://www.elsevier.com/tdm/userlicense/1.0/
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
3,039
Complete genome sequence of Vulcanisaeta distributa type strain (IC-017)
Authors:
K Mavromatis
,
J. Sikorski
,
E Pabst
…
IC 3475 - A stripped dwarf galaxy in the Virgo cluster
Authors:
L. Vigroux
,
M Lachieze-Rey
,
T. Thuan
…
The H-R Diagram of the Open Cluster IC 2602
Authors:
H. Abt
,
Lee Morgan
,
Jason Morgan
…
See all similar
Cited by
3
Secure Electronics Enabled by Atomically Thin and Photosensitive Two-Dimensional Memtransistors
Authors:
Aaryan Oberoi
,
Akhil Dodda
,
He Liu
…
Area efficient camouflaging technique for securing IC reverse engineering
Authors:
Md. Ali
,
Md. Ismail Hossain
,
Fakir Sharif Hossain
Design of a BIST implemented AES crypto-processor ASIC
Authors:
Md. Ali
,
Md. Shazzatur Rahman
,
Fakir Sharif Hossain
See all cited by