Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- code reuse 2 Treffer
- computer architecture 2 Treffer
- data encryption 2 Treffer
- flowgraphs 2 Treffer
- hardware 2 Treffer
-
45 weitere Werte:
- access control 1 Treffer
- advanced encryption standard (aes) 1 Treffer
- application software 1 Treffer
- binary rewriting 1 Treffer
- central processing unit 1 Treffer
- code generators 1 Treffer
- code reuse attack 1 Treffer
- computer access control 1 Treffer
- computer performance 1 Treffer
- computer programming 1 Treffer
- computer security software 1 Treffer
- computer software 1 Treffer
- computer software safety measures 1 Treffer
- computer systems 1 Treffer
- computing platforms 1 Treffer
- control systems 1 Treffer
- control-flow graph 1 Treffer
- control-flow integrity 1 Treffer
- control-flow integrity (cfi) 1 Treffer
- cyberterrorism 1 Treffer
- data flow computing 1 Treffer
- data security 1 Treffer
- deep learning 1 Treffer
- educational technology 1 Treffer
- electronic information resources 1 Treffer
- electronic systems 1 Treffer
- embedded computer systems 1 Treffer
- encryption 1 Treffer
- execution traces (computer program testing) 1 Treffer
- fuzzy sets 1 Treffer
- heuristic algorithms 1 Treffer
- information technology 1 Treffer
- languages 1 Treffer
- linux operating systems 1 Treffer
- malware 1 Treffer
- malware classification 1 Treffer
- memory forensics 1 Treffer
- network attacks 1 Treffer
- physical unclonable functions 1 Treffer
- programming 1 Treffer
- security 1 Treffer
- security systems 1 Treffer
- systems software 1 Treffer
- verification 1 Treffer
- vulnerabilities 1 Treffer
Verlag
Publikation
Sprache
9 Treffer
-
In: DAC: Annual ACM/IEEE Design Automation Conference, 2020, Heft 57, S. 1328-1333Online KonferenzZugriff:
-
In: DAC: Annual ACM/IEEE Design Automation Conference, 2017, Heft 54, S. 267-272Online KonferenzZugriff:
-
In: IEEE Transactions on Computer-Aided Design of Integrated Circuits & Systems, Jg. 37 (2018-07-01), Heft 7, S. 1358-1369Online academicJournalZugriff:
-
In: Security & Communication Networks, 2021-05-22, S. 1-14Online academicJournalZugriff:
-
In: DAC: Annual ACM/IEEE Design Automation Conference, 2016-06-01, S. 964-969Online KonferenzZugriff:
-
In: DAC: Annual ACM/IEEE Design Automation Conference, 2014, S. 778-783Online KonferenzZugriff:
-
In: ACM Transactions on Information & System Security (TISSEC), Jg. 13 (2009-10-01), Heft 1, S. 4-43Online academicJournalZugriff:
-
In: DAC: Annual ACM/IEEE Design Automation Conference, 2016-06-01, S. 440-445Online KonferenzZugriff:
-
In: Cybersecurity (2523-3246), Jg. 3 (2020-08-10), Heft 1, S. 1-32Online academicJournalZugriff: