[1]
A.- mudu T. Ehis, “Hardware Logic Locking Obfuscation for Cyber Hygiene Based on Hamming Distance Obfuscator”, IJOT, vol. 4, no. 10, pp. 1-20, Oct. 2022.