Search Results for Computer science. - Narrowed by: Processor Architectures. - Systems and Data Security. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputer$002bscience.$0026qf$003dSUBJECT$002509Konu$002509Processor$002bArchitectures.$002509Processor$002bArchitectures.$0026qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026ic$003dtrue$0026ps$003d300? 2024-09-05T18:10:39Z Practical Security Properties on Commodity Computing Platforms The uber eXtensible Micro-Hypervisor Framework ent://SD_ILS/0/SD_ILS:427686 2024-09-05T18:10:39Z 2024-09-05T18:10:39Z Yazar&#160;Vasudevan, Amit. author.<br/><a href="https://doi.org/10.1007/978-3-030-25049-2">https://doi.org/10.1007/978-3-030-25049-2</a><br/>Format:&#160;Electronic Resources<br/> Parallel and Distributed Computing, Applications and Technologies 19th International Conference, PDCAT 2018, Jeju Island, South Korea, August 20-22, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:427860 2024-09-05T18:10:39Z 2024-09-05T18:10:39Z Yazar&#160;Park, Jong Hyuk. editor. (orcid)0000-0003-1831-0309<br/><a href="https://doi.org/10.1007/978-981-13-5907-1">https://doi.org/10.1007/978-981-13-5907-1</a><br/>Format:&#160;Electronic Resources<br/> Trusted Digital Circuits Hardware Trojan Vulnerabilities, Prevention and Detection ent://SD_ILS/0/SD_ILS:223022 2024-09-05T18:10:39Z 2024-09-05T18:10:39Z Yazar&#160;Salmani, Hassan. author.<br/><a href="https://doi.org/10.1007/978-3-319-79081-7">https://doi.org/10.1007/978-3-319-79081-7</a><br/>Format:&#160;Electronic Resources<br/> Hardware IP Security and Trust ent://SD_ILS/0/SD_ILS:222151 2024-09-05T18:10:39Z 2024-09-05T18:10:39Z Yazar&#160;Mishra, Prabhat. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49025-0">https://doi.org/10.1007/978-3-319-49025-0</a><br/>Format:&#160;Electronic Resources<br/>