6 papers:
DAC-2013-WeiP #detection #hardware- The undetectable and unprovable hardware trojan horse (SW, MP), p. 2.
DAC-2012-WeiLKP #benchmark #hardware #metric- Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry (SW, KL, FK, MP), pp. 90–95.
CSCW-2012-EiriksdottirKCMMXP #comprehension #game studies #health #multi #pervasive- This is not a one-horse race: understanding player types in multiplayer pervasive health games for youth (EE, DK, RC, EDM, ADM, YX, ESP), pp. 843–852.
DAC-2009-PotkonjakNNM #detection #hardware #using- Hardware Trojan horse detection using gate-level characterization (MP, AN, MN, TM), pp. 688–693.
ITiCSE-2005-SternMH #how #student- You can lead a horse to water: how students really use pedagogical software (LS, SM, RH), pp. 246–250.
HCI-SEC-1997-Hollnagel #question- Building Joint Cognitive Systems: A Case of Horses for Courses? (EH), pp. 39–42.