[1]
“A Deep Review of Hardware Trojan Identification Methods in System-on-Chip Architecture”, JGREC, vol. 1, no. 11, pp. 60–65, Nov. 2025, doi: 10.5281/zenodo.17852638.