Search Results for S&#304;DE. - Narrowed by: Embedded computer systems. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dS$0025C4$0025B0DE.$0026qf$003dSUBJECT$002509Subject$002509Embedded$002bcomputer$002bsystems.$002509Embedded$002bcomputer$002bsystems.$0026ps$003d300?dt=list 2026-03-20T22:42:29Z Hardware Security: Challenges and Solutions ent://SD_ILS/0/SD_ILS:607493 2026-03-20T22:42:29Z 2026-03-20T22:42:29Z Author&#160;Mishra, Ashutosh. editor.&#160;Goswami, Mrinal. editor.&#160;Kumar, Manoj. editor. (orcid)0000-0001-5113-0639&#160;Rajput, Navin Singh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-81213-2">https://doi.org/10.1007/978-3-031-81213-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum Computing Circuits, Systems, Automation and Applications ent://SD_ILS/0/SD_ILS:602002 2026-03-20T22:42:29Z 2026-03-20T22:42:29Z Author&#160;Thapliyal, Himanshu. editor.&#160;Humble, Travis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-37966-6">https://doi.org/10.1007/978-3-031-37966-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware Security A Look into the Future ent://SD_ILS/0/SD_ILS:603894 2026-03-20T22:42:29Z 2026-03-20T22:42:29Z Author&#160;Tehranipoor, Mark. author.&#160;Zamiri Azar, Kimia. author.&#160;Asadizanjani, Navid. author. (orcid)0000-0003-3347-5072&#160;Rahman, Fahim. author.&#160;Mardani Kamali, Hadi. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58687-3">https://doi.org/10.1007/978-3-031-58687-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Embedded Systems Security ent://SD_ILS/0/SD_ILS:604651 2026-03-20T22:42:29Z 2026-03-20T22:42:29Z Author&#160;Hou, Xiaolu. author.&#160;Breier, Jakub. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-62205-2">https://doi.org/10.1007/978-3-031-62205-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Explainable AI for Cybersecurity ent://SD_ILS/0/SD_ILS:528936 2026-03-20T22:42:29Z 2026-03-20T22:42:29Z Author&#160;Pan, Zhixin. author.&#160;Mishra, Prabhat. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-46479-9">https://doi.org/10.1007/978-3-031-46479-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware Security Training, Hands-on! ent://SD_ILS/0/SD_ILS:527989 2026-03-20T22:42:29Z 2026-03-20T22:42:29Z Author&#160;Tehranipoor, Mark. author.&#160;Anandakumar, N. Nalla. author.&#160;Farahmandi, Farimah. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-31034-8">https://doi.org/10.1007/978-3-031-31034-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>