Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
hardware security primitive (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/163)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas
Survey on the benefits of using memristors for PUFs
Aljafar, Muayad J.
;
Acken, John M.
International Journal of Parallel, Emergent and Distributed Systems
2022
/
p. 40-67
https://doi.org/10.1080/17445760.2021.1972295
artikkel ajakirjas
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
161
1.
hardware security primitive
2.
hardware security
3.
communicating hardware/software systems
4.
communicating software/hardware systems
5.
computer hardware
6.
Computer software and hardware
7.
crypto-hardware
8.
DNN hardware accelerator
9.
Embedded hardware
10.
hardware
11.
hardware acceleration
12.
hardware accelerator
13.
hardware close programming
14.
hardware customization
15.
hardware design
16.
hardware for the IoT
17.
hardware implementation
18.
hardware in the loop
19.
hardware Obfuscation
20.
hardware problems
21.
hardware rejuvenation
22.
hardware reliability
23.
Hardware Trojan
24.
hardware trojan horse
25.
Hardware Trojan Horses
26.
hardware trojans
27.
Hardware Trojans (HT)
28.
Hardware Verification
29.
hardware/software co-design
30.
hardware-in-the loop simulation
31.
hardware-in-the-loop
32.
Hardware-in-the-Loop simulation
33.
integer-only hardware
34.
open hardware
35.
open source hardware
36.
opensource hardware
37.
open-source hardware
38.
power-hardware-in-the-loop
39.
reconfigurable hardware
40.
software/hardware partitioning
41.
software/hardware systems
42.
special-purpose hardware
43.
trustworthy hardware
44.
ad-hoc sensor networks security
45.
Automatic Security Verification
46.
Blockchain security
47.
cache security
48.
communication system security
49.
comprehensive system of economic security
50.
computer security
51.
cooperative security dilemma
52.
cyber security
53.
cyber security education
54.
cyber security exercises
55.
cyber security monitoring
56.
cyber security strategies
57.
cyber-security
58.
data and information security
59.
data security
60.
development of security cameras
61.
digital security practices
62.
drinking water security
63.
economic security
64.
economic security of enterprise
65.
emotional security
66.
energy security
67.
energy security indicator
68.
Estonian information security standard
69.
graded security
70.
high level of security
71.
Homeland security
72.
human security
73.
information security
74.
information security and privacy
75.
initial level of security
76.
internal security
77.
international security
78.
investment and innovation security
79.
IPv6 security
80.
IT security
81.
IT security management
82.
job security
83.
long-term security
84.
maritime cyber security
85.
maritime cyber security operations centers
86.
Maritime Security Operations Center (M-SOC)
87.
medium level of security
88.
metadata model for security measures
89.
Middle Eastern security
90.
Mobile security
91.
national cyber security strategy
92.
national security
93.
NATO. Science for Peace and Security Program
94.
network security
95.
network security monitoring
96.
OSCE (Organization for Security and Co-operation in Europe)
97.
passenger’s security
98.
policy-based routing security
99.
political and security cultures
100.
post-quantum security
101.
power system security
102.
quantitative security
103.
regional security
104.
RISC-V Security Verification
105.
Safety and Security in Sea Transportation
106.
safety and security testing
107.
security
108.
security adaptation
109.
security alert prioritization
110.
security analysis
111.
security and justice (AFSJ)
112.
Security and political science
113.
security and privacy
114.
security and privacy in smart grids
115.
Security Assertion Mining
116.
security closure
117.
Security Coverage
118.
security dataset
119.
security dilemma
120.
Security evaluation
121.
security evaluation instruments
122.
Security limitations
123.
security log analysis
124.
security management
125.
security model
126.
security monitoring
127.
security notion
128.
security objectives
129.
security of data
130.
security of supply
131.
security operation center
132.
security operations center
133.
security patterns
134.
security policy
135.
security problem definition
136.
security proof
137.
security protocols
138.
security requirements
139.
security requirements engineering
140.
security research
141.
security risk assessment
142.
security risk management
143.
security risks
144.
security science and technology
145.
security strategies
146.
security systems for military objects
147.
security testing
148.
security training
149.
security verification
150.
security-by-design
151.
social security planning
152.
societal security
153.
software security
154.
software security level
155.
software security subcharacteristics
156.
sufficient level of security
157.
system of economic security
158.
system security
159.
terrorism security
160.
transmission System Security
161.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT