Search Results for - Narrowed by: Springer E-Book Collection - Computer security. - Systems engineering. - Systems and Data Security.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Systems$002bengineering.$002509Systems$002bengineering.$0026qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026ps$003d300?2024-05-30T08:58:31ZThe Hardware Trojan War Attacks, Myths, and Defensesent://SD_ILS/0/SD_ILS:2233192024-05-30T08:58:31Z2024-05-30T08:58:31ZYazar Bhunia, Swarup. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68511-3">https://doi.org/10.1007/978-3-319-68511-3</a><br/>Format: Electronic Resources<br/>Trusted Digital Circuits Hardware Trojan Vulnerabilities, Prevention and Detectionent://SD_ILS/0/SD_ILS:2230222024-05-30T08:58:31Z2024-05-30T08:58:31ZYazar Salmani, Hassan. author.<br/><a href="https://doi.org/10.1007/978-3-319-79081-7">https://doi.org/10.1007/978-3-319-79081-7</a><br/>Format: Electronic Resources<br/>Inside Radio: An Attack and Defense Guideent://SD_ILS/0/SD_ILS:2248462024-05-30T08:58:31Z2024-05-30T08:58:31ZYazar Yang, Qing. author.<br/><a href="https://doi.org/10.1007/978-981-10-8447-8">https://doi.org/10.1007/978-981-10-8447-8</a><br/>Format: Electronic Resources<br/>Hardware IP Security and Trustent://SD_ILS/0/SD_ILS:2221512024-05-30T08:58:31Z2024-05-30T08:58:31ZYazar Mishra, Prabhat. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49025-0">https://doi.org/10.1007/978-3-319-49025-0</a><br/>Format: Electronic Resources<br/>Compilation for Secure Multi-party Computationent://SD_ILS/0/SD_ILS:2257222024-05-30T08:58:31Z2024-05-30T08:58:31ZYazar Büscher, Niklas. author.<br/><a href="https://doi.org/10.1007/978-3-319-67522-0">https://doi.org/10.1007/978-3-319-67522-0</a><br/>Format: Electronic Resources<br/>Security-Aware Design for Cyber-Physical Systems A Platform-Based Approachent://SD_ILS/0/SD_ILS:2250792024-05-30T08:58:31Z2024-05-30T08:58:31ZYazar Lin, Chung-Wei. author.<br/><a href="https://doi.org/10.1007/978-3-319-51328-7">https://doi.org/10.1007/978-3-319-51328-7</a><br/>Format: Electronic Resources<br/>Information Fusion for Cyber-Security Analyticsent://SD_ILS/0/SD_ILS:2259502024-05-30T08:58:31Z2024-05-30T08:58:31ZYazar Alsmadi, Izzat M. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44257-0">https://doi.org/10.1007/978-3-319-44257-0</a><br/>Format: Electronic Resources<br/>