Books on the topic 'Embedded system security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Embedded system security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Halak, Basel, ed. Machine Learning for Embedded System Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94178-9.
Full textCui, Ang. Embedded System Security: A Software-based Approach. [publisher not identified], 2015.
Find full textYŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, ред. Imbedidŭ poan unyŏng chʻeje kisul kaebal =: Embedded secure operating system technology development. Chisik Kyŏngjebu, 2008.
Find full textYŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, ред. Imbedidŭ poan unyŏng chʻeje kisul kaebal =: Embedded secure operating system technology development. Chisik Kyŏngjebu, 2008.
Find full textInternational Association for Cryptologic Research. Cryptographic Hardware and Embedded Systems - CHES 2003: 5th International Workshop, Cologne, Germany, September 8-10, 2003. Proceedings. Springer Berlin Heidelberg, 2003.
Find full textCHES 2010 (2010 Santa Barbara, Calif.). Cryptographic hardware and embedded systems-- CHES 2010: 12th international workshop, Santa Barbara, USA, August 17-20,2010 : proceedings. Springer, 2010.
Find full textPande, Amit, and Joseph Zambreno. Embedded Multimedia Security Systems. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4459-5.
Full textRan, Giladi, Serpanos Dimitrios Nikolaou, and NATO Advanced Research Workshop on Security and Embedded Systems (2005 August 22-26 : Patras, Greece), eds. Security and embedded systems. IOS Press, 2006.
Find full textHou, Xiaolu, and Jakub Breier. Cryptography and Embedded Systems Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62205-2.
Full textPande, Amit. Embedded Multimedia Security Systems: Algorithms and Architectures. Springer London, 2013.
Find full textDebbabi, Mourad. Embedded Java security: Security for mobile devices. Springer, 2010.
Find full textKomarov, Fedor. Large scale computations, embedded systems, and computer security. Nova Science Publishers, 2009.
Find full textMotahhir, Saad, and Yassine Maleh. Security Engineering for Embedded and Cyber-Physical Systems. CRC Press, 2022. http://dx.doi.org/10.1201/9781003278207.
Full textKomarov, Fedor. Large scale computations, embedded systems and computer security. Nova Science Publishers, 2010.
Find full textKomarov, Fedor. Large scale computations, embedded systems, and computer security. Nova Science Publishers, 2009.
Find full textStapko, Timothy John. Practical embedded security: Building secure resource-constrained systems. Elsevier/Newnes, 2008.
Find full textKinney, Steven. Trusted platform module basics: Using TPM in embedded systems. Newnes, 2006.
Find full textCHES '99 (1999 Worcester, Mass.). Cryptographic hardware and embedded systems: First International Workshop, CHES '99, Worcester, MA, USA, August 1999 : proceedings. Springer, 1999.
Find full textCHES'99 (1999 Worchester, Mass.). Cryptographic hardware and embedded systems: First International Workshop, CHES '99, Worchester, MA, USA, August 1999 : proceedings. Springer, 1999.
Find full textCHES 2004 (2004 Cambridge, Mass.). Cryptographic hardware and embedded systems--CHES 2004: 6th international workshop, Cambridge, MA, USA, 2004 : proceedings. Springer-Verlag, 2004.
Find full textPeeters, Eric. Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits. Springer New York, 2013.
Find full textHalak, Basel. Machine Learning for Embedded System Security. Springer International Publishing AG, 2022.
Find full textMachine Learning for Embedded System Security. Springer International Publishing AG, 2023.
Find full textJones, Gavin. Embedded Security: Procuring an Effective Facility Protective Security System. Taylor & Francis Group, 2016.
Find full textPretty, Bill. Building a Home Security System with Beaglebone. Packt Publishing, Limited, 2013.
Find full textPretty, Bill. Building a Home Security System with BeagleBone. Packt Publishing, 2013.
Find full text(Editor), Nadia Nedjah, and Luiza De Macedo Mourelle (Editor), eds. New Trends in Cryptographic Systems (Intellegent System Engineering). Nova Science Publishers, 2006.
Find full textStudy on Automotive Embedded System Design of Engine, Brake and Security System. Independently Published, 2021.
Find full textHobbs, Chris. Embedded Software Development for Safety-Critical Systems. Auerbach Publishers, Incorporated, 2017.
Find full textHobbs, Chris. Embedded Software Development for Safety-Critical Systems. Auerbach Publishers, Incorporated, 2017.
Find full textHobbs, Chris. Embedded Software Development for Safety-Critical Systems. Auerbach Publishers, Incorporated, 2017.
Find full textHobbs, Chris. Embedded Software Development for Safety-Critical Systems. Taylor & Francis Group, 2020.
Find full textHobbs, Chris. Embedded Software Development for Safety-Critical Systems. Auerbach Publishers, Incorporated, 2017.
Find full textEmbedded Software Development for Safety-Critical Systems. Auerbach Publications, 2015.
Find full textWess'12 : Workshop on Embedded Systems Security: Workshop on Embedded Systems Security. Association for Computing Machinery, 2012.
Find full text(Editor), Stephen Hailes, and Alexandr Seleznyov (Editor), eds. Security in Networked Embedded Systems. Springer, 2007.
Find full textZürn, Michael. The Rise of the Global Governance System: A Historical-Institutionalist Account. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198819974.003.0006.
Full textStapko, Timothy. Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology). Newnes, 2007.
Find full textWolf, Marko, Christof Paar, and Kerstin Lemke. Embedded Security in Cars: Securing Current and Future Automotive IT Applications. Springer, 2010.
Find full textZambreno, Joseph, and Amit Pande. Embedded Multimedia Security Systems: Algorithms and Architectures. Springer London, Limited, 2014.
Find full textEmbedded Multimedia Security Systems Algorithms And Architectures. Springer, 2012.
Find full textDebbabi, Mourad, Chamseddine Talhi, Sami Zhioua, and Mohamed Saleh. Embedded Java Security: Security for Mobile Devices. Springer London, Limited, 2007.
Find full textDebbabi, Mourad, Chamseddine Talhi, Sami Zhioua, and Mohamed Saleh. Embedded Java Security: Security for Mobile Devices. Springer, 2006.
Find full text(Editor), Nadia Nedjah, Luiza De Macedo Mourelle (Editor), and Luiza De Macedo Mourelle (Editor), eds. Embedded Cryptographic Hardware: Design & Security. Nova Science Publishers, 2006.
Find full textEmbedded Security in Cars: Securing Current and Future Automotive IT Applications. Springer, 2006.
Find full text