Arama Sonu&ccedil;lar&#305; Security. - Daralt&#305;lm&#305;&#351;: Systems engineering. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSecurity.$0026qf$003dSUBJECT$002509Konu$002509Systems$002bengineering.$002509Systems$002bengineering.$0026te$003dILS$0026ps$003d300?dt=list 2024-12-27T01:58:39Z Security in Embedded Devices ent://SD_ILS/0/SD_ILS:172275 2024-12-27T01:58:39Z 2024-12-27T01:58:39Z Yazar&#160;Gebotys, Catherine H. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-1530-6">http://dx.doi.org/10.1007/978-1-4419-1530-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Introduction to Hardware Security and Trust ent://SD_ILS/0/SD_ILS:173063 2024-12-27T01:58:39Z 2024-12-27T01:58:39Z Yazar&#160;Tehranipoor, Mohammad. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-8080-9">http://dx.doi.org/10.1007/978-1-4419-8080-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Handbook of FPGA Design Security ent://SD_ILS/0/SD_ILS:205415 2024-12-27T01:58:39Z 2024-12-27T01:58:39Z Yazar&#160;Huffmire, Ted. author.&#160;Irvine, Cynthia. author.&#160;Nguyen, Thuy D. author.&#160;Levin, Timothy. author.&#160;Kastner, Ryan. author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-90-481-9157-4">http://dx.doi.org/10.1007/978-90-481-9157-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Embedded Multimedia Security Systems Algorithms and Architectures ent://SD_ILS/0/SD_ILS:330984 2024-12-27T01:58:39Z 2024-12-27T01:58:39Z Yazar&#160;Pande, Amit. author.&#160;Zambreno, Joseph. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(330984.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4459-5">http://dx.doi.org/10.1007/978-1-4471-4459-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Physically Unclonable Functions From Basic Design Principles to Advanced Hardware Security Applications ent://SD_ILS/0/SD_ILS:400724 2024-12-27T01:58:39Z 2024-12-27T01:58:39Z Yazar&#160;Halak, Basel. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-76804-5">https://doi.org/10.1007/978-3-319-76804-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Fault Tolerant Architectures for Cryptography and Hardware Security ent://SD_ILS/0/SD_ILS:400923 2024-12-27T01:58:39Z 2024-12-27T01:58:39Z Yazar&#160;PATRANABIS, SIKHAR. editor.&#160;Mukhopadhyay, Debdeep. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-10-1387-4">https://doi.org/10.1007/978-981-10-1387-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Memristor Technology: Synthesis and Modeling for Sensing and Security Applications ent://SD_ILS/0/SD_ILS:402012 2024-12-27T01:58:39Z 2024-12-27T01:58:39Z Yazar&#160;Abunahla, Heba. author.&#160;Mohammad, Baker. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-65699-1">https://doi.org/10.1007/978-3-319-65699-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advanced DPA Theory and Practice Towards the Security Limits of Secure Embedded Circuits ent://SD_ILS/0/SD_ILS:332116 2024-12-27T01:58:39Z 2024-12-27T01:58:39Z Yazar&#160;Peeters, Eric. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332116.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-6783-0">http://dx.doi.org/10.1007/978-1-4614-6783-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security Trends for FPGAS From Secured to Secure Reconfigurable Systems ent://SD_ILS/0/SD_ILS:206038 2024-12-27T01:58:39Z 2024-12-27T01:58:39Z Yazar&#160;Badrignans, Benoit. editor.&#160;Danger, Jean Luc. editor.&#160;Fischer, Viktor. editor.&#160;Gogniat, Guy. editor.&#160;Torres, Lionel. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-94-007-1338-3">http://dx.doi.org/10.1007/978-94-007-1338-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> RFID Security Techniques, Protocols and System-on-Chip Design ent://SD_ILS/0/SD_ILS:167344 2024-12-27T01:58:39Z 2024-12-27T01:58:39Z Yazar&#160;Kitsos, Paris. editor.&#160;Zhang, Yan. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-76481-8">http://dx.doi.org/10.1007/978-0-387-76481-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trusted Digital Circuits Hardware Trojan Vulnerabilities, Prevention and Detection ent://SD_ILS/0/SD_ILS:400715 2024-12-27T01:58:39Z 2024-12-27T01:58:39Z Yazar&#160;Salmani, Hassan. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-79081-7">https://doi.org/10.1007/978-3-319-79081-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Inside Radio: An Attack and Defense Guide ent://SD_ILS/0/SD_ILS:401641 2024-12-27T01:58:39Z 2024-12-27T01:58:39Z Yazar&#160;Yang, Qing. author.&#160;Huang, Lin. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-10-8447-8">https://doi.org/10.1007/978-981-10-8447-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The Hardware Trojan War Attacks, Myths, and Defenses ent://SD_ILS/0/SD_ILS:400849 2024-12-27T01:58:39Z 2024-12-27T01:58:39Z Yazar&#160;Bhunia, Swarup. editor.&#160;Tehranipoor, Mark M. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-68511-3">https://doi.org/10.1007/978-3-319-68511-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Physical Unclonable Functions in Theory and Practice ent://SD_ILS/0/SD_ILS:331657 2024-12-27T01:58:39Z 2024-12-27T01:58:39Z Yazar&#160;B&ouml;hm, Christoph. author.&#160;Hofer, Maximilian. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(331657.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5040-5">http://dx.doi.org/10.1007/978-1-4614-5040-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>