Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
hardware security primitive (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/168)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas
Survey on the benefits of using memristors for PUFs
Aljafar, Muayad J.
;
Acken, John M.
International Journal of Parallel, Emergent and Distributed Systems
2022
/
p. 40-67
https://doi.org/10.1080/17445760.2021.1972295
artikkel ajakirjas
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
166
1.
hardware security primitive
2.
hardware security
3.
communicating hardware/software systems
4.
communicating software/hardware systems
5.
computer hardware
6.
Computer software and hardware
7.
crypto-hardware
8.
DNN hardware accelerator
9.
Embedded hardware
10.
hardware
11.
hardware acceleration
12.
hardware accelerator
13.
hardware close programming
14.
hardware customization
15.
hardware design
16.
hardware for the IoT
17.
hardware implementation
18.
hardware in the loop
19.
hardware Obfuscation
20.
hardware problems
21.
hardware rejuvenation
22.
hardware reliability
23.
Hardware Trojan
24.
hardware trojan horse
25.
Hardware Trojan Horses
26.
hardware trojans
27.
Hardware Trojans (HT)
28.
Hardware Verification
29.
hardware/software co-design
30.
hardware-in-the loop simulation
31.
hardware-in-the-loop
32.
Hardware-in-the-Loop simulation
33.
hardware-software integration in robotics
34.
integer-only hardware
35.
open hardware
36.
open source hardware
37.
opensource hardware
38.
open-source hardware
39.
power-hardware-in-the-loop
40.
reconfigurable hardware
41.
software/hardware partitioning
42.
software/hardware systems
43.
special-purpose hardware
44.
trustworthy hardware
45.
ad-hoc sensor networks security
46.
Automatic Security Verification
47.
Blockchain security
48.
cache security
49.
cloud security
50.
communication system security
51.
comprehensive system of economic security
52.
computer security
53.
cooperative security dilemma
54.
cyber security
55.
cyber security education
56.
cyber security exercises
57.
cyber security monitoring
58.
cyber security strategies
59.
cyber-physical system security
60.
cyber-security
61.
data and information security
62.
data security
63.
development of security cameras
64.
digital security practices
65.
drinking water security
66.
economic security
67.
economic security of enterprise
68.
emotional security
69.
energy security
70.
energy security indicator
71.
Estonian information security standard
72.
graded security
73.
high level of security
74.
Homeland security
75.
human security
76.
information security
77.
information security and privacy
78.
initial level of security
79.
internal security
80.
international security
81.
investment and innovation security
82.
IPv6 security
83.
IT security
84.
IT security management
85.
job security
86.
long-term security
87.
maritime cyber security
88.
maritime cyber security operations centers
89.
Maritime Security Operations Center (M-SOC)
90.
medium level of security
91.
metadata model for security measures
92.
Middle Eastern security
93.
Mobile security
94.
national cyber security strategy
95.
national security
96.
NATO. Science for Peace and Security Program
97.
network security
98.
network security monitoring
99.
OSCE (Organization for Security and Co-operation in Europe)
100.
passenger’s security
101.
policy-based routing security
102.
political and security cultures
103.
post-quantum security
104.
power system security
105.
quantitative security
106.
regional security
107.
RISC-V Security Verification
108.
Safety and Security in Sea Transportation
109.
safety and security testing
110.
security
111.
security adaptation
112.
security alert prioritization
113.
security analysis
114.
security and justice (AFSJ)
115.
Security and political science
116.
security and privacy
117.
security and privacy in smart grids
118.
Security Assertion
119.
Security Assertion Mining
120.
security closure
121.
Security Coverage
122.
security dataset
123.
security dilemma
124.
Security evaluation
125.
security evaluation instruments
126.
Security Level Evaluation
127.
Security limitations
128.
security log analysis
129.
security management
130.
security model
131.
security monitoring
132.
security notion
133.
security objectives
134.
security of data
135.
security of supply
136.
security operation center
137.
security operations center
138.
security patterns
139.
security policy
140.
security problem definition
141.
security proof
142.
security protocols
143.
security requirements
144.
security requirements engineering
145.
security research
146.
security risk assessment
147.
security risk management
148.
security risks
149.
security science and technology
150.
security strategies
151.
security systems for military objects
152.
security testing
153.
security training
154.
security verification
155.
security-by-design
156.
social security planning
157.
societal security
158.
software security
159.
software security level
160.
software security subcharacteristics
161.
sufficient level of security
162.
system of economic security
163.
system security
164.
terrorism security
165.
transmission System Security
166.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT