{"id":"https://openalex.org/W2802806963","doi":"https://doi.org/10.1007/s41635-018-0037-2","title":"Surveying the Hardware Trojan Threat Landscape for the Internet-of-Things","display_name":"Surveying the Hardware Trojan Threat Landscape for the Internet-of-Things","publication_year":2018,"publication_date":"2018-04-30","ids":{"openalex":"https://openalex.org/W2802806963","doi":"https://doi.org/10.1007/s41635-018-0037-2","mag":"2802806963"},"language":"en","primary_location":{"id":"doi:10.1007/s41635-018-0037-2","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s41635-018-0037-2","pdf_url":null,"source":{"id":"https://openalex.org/S4210175245","display_name":"Journal of Hardware and Systems Security","issn_l":"2509-3428","issn":["2509-3428","2509-3436"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Hardware and Systems Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109441398","display_name":"Vivek Venugopalan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Vivek Venugopalan","raw_affiliation_strings":["USC Information Sciences Institute, Arlington, VA, USA"],"affiliations":[{"raw_affiliation_string":"USC Information Sciences Institute, Arlington, VA, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109211045","display_name":"Cameron D. Patterson","orcid":null},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cameron D. Patterson","raw_affiliation_strings":["Bradley Department of ECE, Virginia Tech, Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"Bradley Department of ECE, Virginia Tech, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5109441398"],"corresponding_institution_ids":[],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":null,"fwci":4.2041,"has_fulltext":false,"cited_by_count":43,"citation_normalized_percentile":{"value":0.94726517,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"2","issue":"2","first_page":"131","last_page":"141"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7085567116737366},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6941107511520386},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6710342764854431},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6669822335243225},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.5991285443305969},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.5447167158126831},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.48281869292259216},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.46941646933555603},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.4209745228290558},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.32413655519485474},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.15432047843933105},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.14964842796325684},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08946198225021362}],"concepts":[{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7085567116737366},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6941107511520386},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6710342764854431},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6669822335243225},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.5991285443305969},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.5447167158126831},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.48281869292259216},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.46941646933555603},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.4209745228290558},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.32413655519485474},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.15432047843933105},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.14964842796325684},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08946198225021362}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s41635-018-0037-2","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s41635-018-0037-2","pdf_url":null,"source":{"id":"https://openalex.org/S4210175245","display_name":"Journal of Hardware and Systems Security","issn_l":"2509-3428","issn":["2509-3428","2509-3436"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Hardware and Systems Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":57,"referenced_works":["https://openalex.org/W71050201","https://openalex.org/W83507793","https://openalex.org/W207267598","https://openalex.org/W1541663547","https://openalex.org/W1605172130","https://openalex.org/W1965115062","https://openalex.org/W1994870682","https://openalex.org/W2002826523","https://openalex.org/W2012032225","https://openalex.org/W2014066342","https://openalex.org/W2047855165","https://openalex.org/W2050145588","https://openalex.org/W2054753696","https://openalex.org/W2071164745","https://openalex.org/W2096548330","https://openalex.org/W2097624522","https://openalex.org/W2098536553","https://openalex.org/W2099836087","https://openalex.org/W2100303471","https://openalex.org/W2106366482","https://openalex.org/W2107937248","https://openalex.org/W2114414382","https://openalex.org/W2119649174","https://openalex.org/W2120912790","https://openalex.org/W2122509673","https://openalex.org/W2122711125","https://openalex.org/W2124954128","https://openalex.org/W2128829999","https://openalex.org/W2131570398","https://openalex.org/W2134267152","https://openalex.org/W2142009725","https://openalex.org/W2142963883","https://openalex.org/W2145937629","https://openalex.org/W2150928734","https://openalex.org/W2151668694","https://openalex.org/W2152605584","https://openalex.org/W2153622528","https://openalex.org/W2154958010","https://openalex.org/W2154978532","https://openalex.org/W2160597734","https://openalex.org/W2161998562","https://openalex.org/W2166754425","https://openalex.org/W2335059576","https://openalex.org/W2405518766","https://openalex.org/W2434476332","https://openalex.org/W2511192821","https://openalex.org/W2524064595","https://openalex.org/W2555431798","https://openalex.org/W2589442329","https://openalex.org/W2591749582","https://openalex.org/W2733765803","https://openalex.org/W2809939896","https://openalex.org/W2964265626","https://openalex.org/W3142402742","https://openalex.org/W3150167865","https://openalex.org/W3207160674","https://openalex.org/W4249273825"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W2104671161","https://openalex.org/W4318003314","https://openalex.org/W2148357146","https://openalex.org/W2120912790","https://openalex.org/W2809590703","https://openalex.org/W4248805755","https://openalex.org/W2782017703"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":4}],"updated_date":"2026-04-06T07:47:59.780226","created_date":"2025-10-10T00:00:00"}
