[1]
Thejaswini P, V. G, Anu H, Priya R, Krishna Prasad B S, and Nischay M, “Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation Techniques”, EMITTER Int’l J. of Engin. Technol., vol. 10, no. 2, pp. 370-388, Dec. 2022.