Cite
A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks
MLA
Li, Gaoxiang, et al. A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks. 2022. EBSCOhost, widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsarx&AN=edsarx.2206.01314&authtype=sso&custid=ns315887.
APA
Li, G., Mursi, K. T., Aseeri, A. O., Alkatheiri, M. S., & Zhuang, Y. (2022). A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks.
Chicago
Li, Gaoxiang, Khalid T. Mursi, Ahmad O. Aseeri, Mohammed S. Alkatheiri, and Yu Zhuang. 2022. “A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks.” http://widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsarx&AN=edsarx.2206.01314&authtype=sso&custid=ns315887.