{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:41:16Z","timestamp":1725709276316},"reference-count":0,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1109\/vlsid.2015.110","type":"proceedings-article","created":{"date-parts":[[2015,2,10]],"date-time":"2015-02-10T14:52:48Z","timestamp":1423579968000},"page":"3-5","source":"Crossref","is-referenced-by-count":1,"title":["Tutorial T2: Validation and Debug of Security and Trust Issues in Embedded Systems"],"prefix":"10.1109","author":[{"given":"Prabhat","family":"Mishra","sequence":"first","affiliation":[]},{"given":"Swarup","family":"Bhunia","sequence":"additional","affiliation":[]},{"given":"Srivaths","family":"Ravi","sequence":"additional","affiliation":[]}],"member":"263","event":{"name":"2015 28th International Conference on VLSI Design (VLSI 2015) and 14th International Conference on Embedded Systems","start":{"date-parts":[[2015,1,3]]},"location":"Bangalore","end":{"date-parts":[[2015,1,7]]}},"container-title":["2015 28th International Conference on VLSI Design"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7031475\/7031671\/07031691.pdf?arnumber=7031691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,17]],"date-time":"2020-04-17T06:10:18Z","timestamp":1587103818000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7031691\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":0,"URL":"https:\/\/doi.org\/10.1109\/vlsid.2015.110","relation":{},"subject":[],"published":{"date-parts":[[2015,1]]}}}