Yayın: To design better hardware, think like a cyber-criminal [Resources_At Work]
| dc.contributor.author | Perry, Tekla S. | |
| dc.date.accessioned | 2025-11-13T22:31:23Z | |
| dc.date.issued | 2017-07-01 | |
| dc.identifier.doi | https://doi.org/10.1109/mspec.2017.7951715 | |
| dc.identifier.endpage | 23 | |
| dc.identifier.issn | 0018-9235 | |
| dc.identifier.issue | 7 | |
| dc.identifier.openalex | W2668342055 | |
| dc.identifier.startpage | 22 | |
| dc.identifier.uri | https://hdl.handle.net/11421/14445 | |
| dc.identifier.uri | https://doi.org/10.1109/mspec.2017.7951715 | |
| dc.identifier.volume | 54 | |
| dc.language.iso | en | |
| dc.relation.ispartof | IEEE Spectrum | |
| dc.rights | restrictedAccess | |
| dc.subject | Work (physics) | |
| dc.subject | Unit (ring theory) | |
| dc.subject | Key (lock) | |
| dc.subject | Engineering | |
| dc.subject | Computer security | |
| dc.subject | Engineering management | |
| dc.subject | Telecommunications | |
| dc.subject | Computer science | |
| dc.subject | Psychology | |
| dc.subject | Mechanical engineering | |
| dc.subject.sdg | 16 | |
| dc.title | To design better hardware, think like a cyber-criminal [Resources_At Work] | |
| dc.type | Article | |
| dspace.entity.type | Publication | |
| local.authorid.openalex | A5111569378 |
