[{"author":[{"orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-1837-2254/work/169760864","id":"257333","first_name":"Qazi Arbab","full_name":"Ahmed, Qazi Arbab","orcid":"0000-0002-1837-2254","last_name":"Ahmed"},{"first_name":"Tobias","last_name":"Wiersema","full_name":"Wiersema, Tobias"},{"last_name":"Platzner","full_name":"Platzner, Marco","first_name":"Marco"}],"citation":{"chicago":"Ahmed, Qazi Arbab, Tobias Wiersema, and Marco Platzner. “Post-Configuration Activation of Hardware Trojans in FPGAs.” <i>Journal of Hardware and Systems Security</i> 8, no. 2 (2024): 79–93. <a href=\"https://doi.org/10.1007/s41635-024-00147-5\">https://doi.org/10.1007/s41635-024-00147-5</a>.","short":"Q.A. Ahmed, T. Wiersema, M. Platzner, Journal of Hardware and Systems Security 8 (2024) 79–93.","mla":"Ahmed, Qazi Arbab, et al. “Post-Configuration Activation of Hardware Trojans in FPGAs.” <i>Journal of Hardware and Systems Security</i>, vol. 8, no. 2, Springer Science and Business Media LLC, 2024, pp. 79–93, doi:<a href=\"https://doi.org/10.1007/s41635-024-00147-5\">10.1007/s41635-024-00147-5</a>.","ama":"Ahmed QA, Wiersema T, Platzner M. Post-configuration Activation of Hardware Trojans in FPGAs. <i>Journal of Hardware and Systems Security</i>. 2024;8(2):79-93. doi:<a href=\"https://doi.org/10.1007/s41635-024-00147-5\">10.1007/s41635-024-00147-5</a>","ieee":"Q. A. Ahmed, T. Wiersema, and M. Platzner, “Post-configuration Activation of Hardware Trojans in FPGAs,” <i>Journal of Hardware and Systems Security</i>, vol. 8, no. 2, pp. 79–93, 2024.","alphadin":"<span style=\"font-variant:small-caps;\">Ahmed, Qazi Arbab</span> ; <span style=\"font-variant:small-caps;\">Wiersema, Tobias</span> ; <span style=\"font-variant:small-caps;\">Platzner, Marco</span>: Post-configuration Activation of Hardware Trojans in FPGAs. In: <i>Journal of Hardware and Systems Security</i> Bd. 8, Springer Science and Business Media LLC (2024), Nr. 2, S. 79–93","apa":"Ahmed, Q. A., Wiersema, T., &#38; Platzner, M. (2024). Post-configuration Activation of Hardware Trojans in FPGAs. <i>Journal of Hardware and Systems Security</i>, <i>8</i>(2), 79–93. <a href=\"https://doi.org/10.1007/s41635-024-00147-5\">https://doi.org/10.1007/s41635-024-00147-5</a>","bibtex":"@article{Ahmed_Wiersema_Platzner_2024, title={Post-configuration Activation of Hardware Trojans in FPGAs}, volume={8}, DOI={<a href=\"https://doi.org/10.1007/s41635-024-00147-5\">10.1007/s41635-024-00147-5</a>}, number={2}, journal={Journal of Hardware and Systems Security}, publisher={Springer Science and Business Media LLC}, author={Ahmed, Qazi Arbab and Wiersema, Tobias and Platzner, Marco}, year={2024}, pages={79–93} }"},"status":"public","doi":"10.1007/s41635-024-00147-5","intvolume":"         8","date_updated":"2026-03-17T15:29:13Z","publisher":"Springer Science and Business Media LLC","page":"79-93","_id":"5051","year":"2024","language":[{"iso":"eng"}],"date_created":"2024-10-17T12:40:30Z","title":"Post-configuration Activation of Hardware Trojans in FPGAs","volume":8,"publication_identifier":{"issn":["2509-3428"],"eissn":["2509-3436"]},"type":"journal_article","user_id":"220548","publication":"Journal of Hardware and Systems Security","issue":"2","publication_status":"published"}]
