Your search returned 2 results.

Sort
Results
Detecting Hardware Trojan through Time Domain Constrained Estimator Based Unified Subspace Technique by
  • Xue, Mingfu
  • liu, Wei
Source: IEICE Transactions on Information and Systems
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
An Analysis OfIntel 80x86 Security Architecture and Implementations by
  • Sibert, Olin
  • lindeli, Robert
  • Porras, Phililp A
Source: IEEE Transactions on Software Engineering
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Pages
Visit counter For Websites

Copyright © 
Engr Abul Kalam Library, NEDUET, 2024