Search Results for - Narrowed by: Salmani, Hassan. author. - TEDU library - Springer E-Book Collection - Processor Architectures. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dAUTHOR$002509Yazar$002509Salmani$00252C$002bHassan.$002bauthor.$002509Salmani$00252C$002bHassan.$002bauthor.$0026qf$003dLIBRARY$002509K$0025C3$0025BCt$0025C3$0025BCphane$0025091$00253ATEDU$002509TEDU$002blibrary$0026qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Processor$002bArchitectures.$002509Processor$002bArchitectures.$0026ps$003d300$0026isd$003dtrue? 2024-06-16T17:47:33Z Trusted Digital Circuits Hardware Trojan Vulnerabilities, Prevention and Detection ent://SD_ILS/0/SD_ILS:223022 2024-06-16T17:47:33Z 2024-06-16T17:47:33Z Yazar&#160;Salmani, Hassan. author.<br/><a href="https://doi.org/10.1007/978-3-319-79081-7">https://doi.org/10.1007/978-3-319-79081-7</a><br/>Format:&#160;Electronic Resources<br/> Integrated Circuit Authentication Hardware Trojans and Counterfeit Detection ent://SD_ILS/0/SD_ILS:20013 2024-06-16T17:47:33Z 2024-06-16T17:47:33Z Yazar&#160;Tehranipoor, Mohammad. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-00816-5">http://dx.doi.org/10.1007/978-3-319-00816-5</a><br/>Format:&#160;Electronic Resources<br/>