Search Results for Systems and Data Security. - Narrowed by: Embedded Systems. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSystems$002band$002bData$002bSecurity.$0026qf$003dSUBJECT$002509Subject$002509Embedded$002bSystems.$002509Embedded$002bSystems.$0026ps$003d300$0026isd$003dtrue?dt=list 2026-04-16T12:05:10Z Advanced Techniques for Assertion-Based Verification in Hardware Designs Using Data Mining Algorithms ent://SD_ILS/0/SD_ILS:609153 2026-04-16T12:05:10Z 2026-04-16T12:05:10Z Author&#160;Heidari Iman, Mohammad Reza. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-90410-3">https://doi.org/10.1007/978-3-031-90410-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Random Number Generators Verilog Description, Hardware Implementation and Applications ent://SD_ILS/0/SD_ILS:608059 2026-04-16T12:05:10Z 2026-04-16T12:05:10Z Author&#160;de la Fraga, Luis Gerardo. author. (orcid)0000-0002-9373-9837&#160;Rodr&iacute;guez-Mu&ntilde;oz, Jos&eacute; David. author. (orcid)0009-0001-9553-1394&#160;Tlelo-Cuautle, Esteban. author. (orcid)0000-0001-7187-4686&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-82865-2">https://doi.org/10.1007/978-3-031-82865-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Embedded Systems Security ent://SD_ILS/0/SD_ILS:604651 2026-04-16T12:05:10Z 2026-04-16T12:05:10Z Author&#160;Hou, Xiaolu. author.&#160;Breier, Jakub. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-62205-2">https://doi.org/10.1007/978-3-031-62205-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>