Keyphrases
Logic BIST
100%
Deterministic Logic
66%
Test Point Insertion
50%
Silicon Area
50%
Blockchain
38%
Distance Education
36%
Cryptocurrency
35%
Full-scan
33%
Scan Design
33%
Reduced pin-count Test
33%
Online Banking
33%
Test Design
33%
Hardware Complexity
27%
Fault Coverage
27%
Circuit Testing
25%
Area Cost
25%
Debugging
25%
Vulnerability
23%
Scan Chain
23%
Circuit Size
22%
Machine Learning
22%
Fault Efficiency
22%
Test Data Volume
22%
Bitcoin
20%
Ethereum
20%
Domain Name
19%
Network Traffic
18%
Data Flow Analysis
16%
Software Vulnerability
16%
Resilience
16%
Data Flow Machines
16%
Denial-of-service Attack
16%
Autonomous Systems
16%
Domain Name System
16%
Long Range Wide Area Network (LoRaWAN)
16%
Darknet Traffic
16%
Transaction Authentication
16%
Authentication Mechanism
16%
Attack Detection System
16%
Time-area
16%
Test Quality
16%
Circuit Partitioning
16%
Yield Analysis
16%
Embedded Memory
16%
Gaussian Mixture Model
16%
X-masking
16%
Defect Coverage
16%
Incentive Policy
16%
Mobile Banking
16%
Communication Security
16%
Computer Science
Computer Hardware
98%
Experimental Result
54%
Machine Learning
37%
Learning System
37%
Cryptocurrency
35%
Distance Education
35%
Scan Chain
33%
Insertion Point
33%
Fault Coverage
33%
Software Vulnerability
33%
Online Banking
33%
Virtual Classroom
33%
Network Traffic
29%
Software Systems
27%
Synthesis Algorithm
25%
Authentication
23%
Blockchain
23%
Vulnerability Detection
22%
Case Study
20%
Virtual Computer
20%
Ethereum
20%
Data-Flow Analysis
16%
Authentication Method
16%
Domain Name System
16%
Autonomous System
16%
Threat Detection
16%
Partitioning Approach
16%
Test Application Time
16%
Gaussian Mixture Model
16%
Input/Output
16%
embedded memory
16%
Test Data Volume
16%
Design Validation
16%
Embedded Processor
16%
Context Switching
16%
Breakpoint
16%
debugger
16%
Virtual Memory
16%
Processor Core
16%
Bit Vector
16%
Continuous Monitoring
16%
Multimedia Application
16%
Application Software
16%
Memory Management
16%
Description Logics
16%
Mobile Banking
16%
Cybersecurity
16%
Communication Security
16%
Graph Neural Network
16%
Data Exfiltration
16%