Search Results for - Narrowed by: Salmani, Hassan. author. - TEDU library - Springer E-Book Collection - Processor Architectures.
SirsiDynix Enterprise
https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dAUTHOR$002509Yazar$002509Salmani$00252C$002bHassan.$002bauthor.$002509Salmani$00252C$002bHassan.$002bauthor.$0026qf$003dLIBRARY$002509K$0025C3$0025BCt$0025C3$0025BCphane$0025091$00253ATEDU$002509TEDU$002blibrary$0026qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Processor$002bArchitectures.$002509Processor$002bArchitectures.$0026ps$003d300$0026isd$003dtrue?
2024-06-16T17:47:33Z
Trusted Digital Circuits Hardware Trojan Vulnerabilities, Prevention and Detection
ent://SD_ILS/0/SD_ILS:223022
2024-06-16T17:47:33Z
2024-06-16T17:47:33Z
Yazar Salmani, Hassan. author.<br/><a href="https://doi.org/10.1007/978-3-319-79081-7">https://doi.org/10.1007/978-3-319-79081-7</a><br/>Format: Electronic Resources<br/>
Integrated Circuit Authentication Hardware Trojans and Counterfeit Detection
ent://SD_ILS/0/SD_ILS:20013
2024-06-16T17:47:33Z
2024-06-16T17:47:33Z
Yazar Tehranipoor, Mohammad. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-00816-5">http://dx.doi.org/10.1007/978-3-319-00816-5</a><br/>Format: Electronic Resources<br/>