Yayın:
To design better hardware, think like a cyber-criminal [Resources_At Work]

dc.contributor.authorPerry, Tekla S.
dc.date.accessioned2025-11-13T22:31:23Z
dc.date.issued2017-07-01
dc.identifier.doihttps://doi.org/10.1109/mspec.2017.7951715
dc.identifier.endpage23
dc.identifier.issn0018-9235
dc.identifier.issue7
dc.identifier.openalexW2668342055
dc.identifier.startpage22
dc.identifier.urihttps://hdl.handle.net/11421/14445
dc.identifier.urihttps://doi.org/10.1109/mspec.2017.7951715
dc.identifier.volume54
dc.language.isoen
dc.relation.ispartofIEEE Spectrum
dc.rightsrestrictedAccess
dc.subjectWork (physics)
dc.subjectUnit (ring theory)
dc.subjectKey (lock)
dc.subjectEngineering
dc.subjectComputer security
dc.subjectEngineering management
dc.subjectTelecommunications
dc.subjectComputer science
dc.subjectPsychology
dc.subjectMechanical engineering
dc.subject.sdg16
dc.titleTo design better hardware, think like a cyber-criminal [Resources_At Work]
dc.typeArticle
dspace.entity.typePublication
local.authorid.openalexA5111569378

Dosyalar

Koleksiyonlar