[1]
J. Carlo, “Hardware Trojans Detection and Prevention”, IJETCSIT, pp. 616–620, May 2025, doi: 10.56472/ICCSAIML25-167.