(1)
A Deep Review of Hardware Trojan Identification Methods in System-on-Chip Architecture. JGREC 2025, 1 (11), 60-65. https://doi.org/10.5281/zenodo.17852638.