Keyphrases
Hardware Assurance
100%
Inductive Invariants
75%
Design Process
75%
Semiconductors
75%
Trustworthiness
50%
Formal Verification
50%
Hardware Design
50%
Design Control
50%
Security Testing
25%
Third-party Components
25%
Lightweight Formal Methods
25%
Security Assurance
25%
Information Technology Adoption
25%
Level of Assurance
25%
Internet Financial
25%
Conventional Design
25%
Red Flags
25%
Tool Design
25%
Complex Design
25%
IP Blocks
25%
Trojan Detection
25%
Security Invariant
25%
Security Properties
25%
Financial Energy
25%
Interconnected Systems
25%
Security Rules
25%
Critical Infrastructure Security
25%
Critical Infrastructure Systems
25%
Personal Computer
25%
Software Trustworthiness
25%
Side Channel
25%
Unauthorized Access
25%
Minor Addition
25%
Undesirable Behavior
25%
Homeland Security
25%
World Wide Web
25%
Intelligent Systems
25%
Design Cost
25%
Multi-location
25%
Power Grid Network
25%
Multiple Organizations
25%
Modern Information Technology
25%
Mobile Phone
25%
Everyday Life
25%
Software Design
25%
Disadvantaged Groups
25%
Computer Science
Computer Hardware
100%
Invariant
50%
Formal Verification
20%
Hardware Design
20%
Critical Infrastructure
20%
Information Technology
20%
Multiple Location
10%
Unauthorized Access
10%
Infrastructure System
10%
Homeland Security
10%
Party Component
10%
Side Channel
10%
Security Properties
10%
Software Design
10%
Security Assurance
10%
Disadvantaged Group
10%
Personal Computer
10%
Common Practice
10%