APA (7th ed.) Citation

Bhunia, S., Hsiao, M. S., Banga, M., & Narasimhan, S. (2014). Hardware Trojan Attacks: Threat Analysis and Countermeasures. Proceedings of the IEEE, 102(8), 1229-1247. https://doi.org/10.1109/JPROC.2014.2334493

Chicago Style (17th ed.) Citation

Bhunia, Swarup, Michael S. Hsiao, Mainak Banga, and Seetharam Narasimhan. "Hardware Trojan Attacks: Threat Analysis and Countermeasures." Proceedings of the IEEE 102, no. 8 (2014): 1229-1247. https://doi.org/10.1109/JPROC.2014.2334493.

MLA (9th ed.) Citation

Bhunia, Swarup, et al. "Hardware Trojan Attacks: Threat Analysis and Countermeasures." Proceedings of the IEEE, vol. 102, no. 8, 2014, pp. 1229-1247, https://doi.org/10.1109/JPROC.2014.2334493.

Warning: These citations may not always be 100% accurate.