{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T04:01:10Z","timestamp":1767844870363,"version":"3.49.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/iscas.2017.8050633","type":"proceedings-article","created":{"date-parts":[[2017,9,28]],"date-time":"2017-09-28T16:33:32Z","timestamp":1506616412000},"page":"1-4","source":"Crossref","is-referenced-by-count":17,"title":["Runtime mitigation of illegal packet request attacks in Networks-on-Chip"],"prefix":"10.1109","author":[{"given":"N","family":"Prasad","sequence":"first","affiliation":[]},{"given":"Rajit","family":"Karmakar","sequence":"additional","affiliation":[]},{"given":"Santanu","family":"Chattopadhyay","sequence":"additional","affiliation":[]},{"given":"Indrajit","family":"Chakrabarti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s00034-013-9568-5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-8274-1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2016.59"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2107763.2107770"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2014.2383442"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2015.2405933"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2629677"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2013.6557149"},{"key":"ref4","first-page":"1","article-title":"Achieving composability in noc-based mpsocs through gos management at software level","author":"carara","year":"2011","journal-title":"DATE"},{"key":"ref3","first-page":"133","article-title":"Managing gos flows at task level in noc-based mpsocs","author":"carara","year":"2009","journal-title":"VLSI-SoC"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SIPS.2005.1579858"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2003.1183361"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2016.59"},{"key":"ref7","first-page":"3241","article-title":"Router attack toward noc-enabled mpsoc and montoring countermeasures against such threat","volume":"34","author":"biswas","year":"2015","journal-title":"CSSP"},{"key":"ref2","first-page":"1136","article-title":"Packet Security with Path Sensitization for NoCs","author":"travis boraten","year":"2016","journal-title":"Design Automation Test in Europe Conference Exhibition (DATE)"},{"key":"ref1","first-page":"1","article-title":"Fort-noes: Mitigating the threat of a compromised noc","author":"ancajas","year":"2014","journal-title":"DAC"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.1995.524546"}],"event":{"name":"2017 IEEE International Symposium on Circuits and Systems (ISCAS)","location":"Baltimore, MD, USA","start":{"date-parts":[[2017,5,28]]},"end":{"date-parts":[[2017,5,31]]}},"container-title":["2017 IEEE International Symposium on Circuits and Systems (ISCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8014728\/8049747\/08050633.pdf?arnumber=8050633","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T17:31:28Z","timestamp":1509125488000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8050633\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iscas.2017.8050633","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}