Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- computer security 10 Treffer
- code reuse 4 Treffer
- computer access control 4 Treffer
- computer architecture 4 Treffer
- computing platforms 4 Treffer
-
28 weitere Werte:
- hardware 4 Treffer
- linux operating systems 4 Treffer
- computer programming 2 Treffer
- computer science 2 Treffer
- computer software 2 Treffer
- computer systems 2 Treffer
- data encryption 2 Treffer
- data flow computing 2 Treffer
- data security 2 Treffer
- electronic systems 2 Treffer
- embedded computer systems 2 Treffer
- error detection 2 Treffer
- error recovery 2 Treffer
- fault injection 2 Treffer
- fault-tolerant computing 2 Treffer
- flowgraphs 2 Treffer
- heuristic algorithms 2 Treffer
- information technology 2 Treffer
- integrated circuit verification 2 Treffer
- international business machines corp. 2 Treffer
- message authentication codes 2 Treffer
- microprocessors 2 Treffer
- physical unclonable functions 2 Treffer
- ras 2 Treffer
- ser 2 Treffer
- wearable technology 2 Treffer
- cfi 1 Treffer
- code reuse attack 1 Treffer
Sprache
7 Treffer
-
In: DAC: Annual ACM/IEEE Design Automation Conference, 2020, Heft 57, S. 1328-1333Online KonferenzZugriff:
-
In: DAC: Annual ACM/IEEE Design Automation Conference, 2017, Heft 54, S. 267-272Online KonferenzZugriff:
-
In: DAC: Annual ACM/IEEE Design Automation Conference, 2010-06-01, S. 525-530Online KonferenzZugriff:
-
In: DAC: Annual ACM/IEEE Design Automation Conference, 2016-06-01, S. 964-969Online KonferenzZugriff:
-
In: DAC: Annual ACM/IEEE Design Automation Conference, 2014, S. 778-783Online KonferenzZugriff:
-
In: DAC: Annual ACM/IEEE Design Automation Conference, 2016-06-01, S. 440-445Online KonferenzZugriff:
-
In: DAC: Annual ACM/IEEE Design Automation Conference, 2019, Heft 56, S. 1193-1194Online KonferenzZugriff: