To see the other types of publications on this topic, follow the link: Embedded system security.

Books on the topic 'Embedded system security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Embedded system security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Halak, Basel, ed. Machine Learning for Embedded System Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94178-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cui, Ang. Embedded System Security: A Software-based Approach. [publisher not identified], 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, ред. Imbedidŭ poan unyŏng chʻeje kisul kaebal =: Embedded secure operating system technology development. Chisik Kyŏngjebu, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, ред. Imbedidŭ poan unyŏng chʻeje kisul kaebal =: Embedded secure operating system technology development. Chisik Kyŏngjebu, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

International Association for Cryptologic Research. Cryptographic Hardware and Embedded Systems - CHES 2003: 5th International Workshop, Cologne, Germany, September 8-10, 2003. Proceedings. Springer Berlin Heidelberg, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

CHES 2010 (2010 Santa Barbara, Calif.). Cryptographic hardware and embedded systems-- CHES 2010: 12th international workshop, Santa Barbara, USA, August 17-20,2010 : proceedings. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pande, Amit, and Joseph Zambreno. Embedded Multimedia Security Systems. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4459-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ran, Giladi, Serpanos Dimitrios Nikolaou, and NATO Advanced Research Workshop on Security and Embedded Systems (2005 August 22-26 : Patras, Greece), eds. Security and embedded systems. IOS Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hou, Xiaolu, and Jakub Breier. Cryptography and Embedded Systems Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62205-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pande, Amit. Embedded Multimedia Security Systems: Algorithms and Architectures. Springer London, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Debbabi, Mourad. Embedded Java security: Security for mobile devices. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Komarov, Fedor. Large scale computations, embedded systems, and computer security. Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Motahhir, Saad, and Yassine Maleh. Security Engineering for Embedded and Cyber-Physical Systems. CRC Press, 2022. http://dx.doi.org/10.1201/9781003278207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Komarov, Fedor. Large scale computations, embedded systems and computer security. Nova Science Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Komarov, Fedor. Large scale computations, embedded systems, and computer security. Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Stapko, Timothy John. Practical embedded security: Building secure resource-constrained systems. Elsevier/Newnes, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Kinney, Steven. Trusted platform module basics: Using TPM in embedded systems. Newnes, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

CHES '99 (1999 Worcester, Mass.). Cryptographic hardware and embedded systems: First International Workshop, CHES '99, Worcester, MA, USA, August 1999 : proceedings. Springer, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

CHES'99 (1999 Worchester, Mass.). Cryptographic hardware and embedded systems: First International Workshop, CHES '99, Worchester, MA, USA, August 1999 : proceedings. Springer, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

CHES 2004 (2004 Cambridge, Mass.). Cryptographic hardware and embedded systems--CHES 2004: 6th international workshop, Cambridge, MA, USA, 2004 : proceedings. Springer-Verlag, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Peeters, Eric. Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits. Springer New York, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Halak, Basel. Machine Learning for Embedded System Security. Springer International Publishing AG, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Machine Learning for Embedded System Security. Springer International Publishing AG, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Jones, Gavin. Embedded Security: Procuring an Effective Facility Protective Security System. Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Pretty, Bill. Building a Home Security System with Beaglebone. Packt Publishing, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Pretty, Bill. Building a Home Security System with BeagleBone. Packt Publishing, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

(Editor), Nadia Nedjah, and Luiza De Macedo Mourelle (Editor), eds. New Trends in Cryptographic Systems (Intellegent System Engineering). Nova Science Publishers, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Study on Automotive Embedded System Design of Engine, Brake and Security System. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Hobbs, Chris. Embedded Software Development for Safety-Critical Systems. Auerbach Publishers, Incorporated, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Hobbs, Chris. Embedded Software Development for Safety-Critical Systems. Auerbach Publishers, Incorporated, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Hobbs, Chris. Embedded Software Development for Safety-Critical Systems. Auerbach Publishers, Incorporated, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Hobbs, Chris. Embedded Software Development for Safety-Critical Systems. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Hobbs, Chris. Embedded Software Development for Safety-Critical Systems. Auerbach Publishers, Incorporated, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Embedded Software Development for Safety-Critical Systems. Auerbach Publications, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Embedded Systems Security. Elsevier, 2012. http://dx.doi.org/10.1016/c2010-0-67275-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Security in Embedded Devices Embedded Systems. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Wess'12 : Workshop on Embedded Systems Security: Workshop on Embedded Systems Security. Association for Computing Machinery, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

(Editor), Stephen Hailes, and Alexandr Seleznyov (Editor), eds. Security in Networked Embedded Systems. Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Cryptography and Embedded Systems Security. Springer, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Gebotys, Catherine H. H. Security in Embedded Devices. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Cyber-Physical Systems Security. Springer, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Zürn, Michael. The Rise of the Global Governance System: A Historical-Institutionalist Account. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198819974.003.0006.

Full text
Abstract:
The global governance system developed in the 1990s as a result of a path-dependent sequence that started with the choice of embedded liberalism in the 1940s. The post-Second World War constellation provided a critical juncture that led to institutionalized embedded liberalism and collective security under American leadership. Afterwards, self-reinforcing mechanisms strengthened this institutional design. This whole dynamic was accelerated by an external push when the Soviet empire faltered and functional differentiation could develop its full potential. Together, these developments created a
APA, Harvard, Vancouver, ISO, and other styles
43

Stapko, Timothy. Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology). Newnes, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Wolf, Marko, Christof Paar, and Kerstin Lemke. Embedded Security in Cars: Securing Current and Future Automotive IT Applications. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Zambreno, Joseph, and Amit Pande. Embedded Multimedia Security Systems: Algorithms and Architectures. Springer London, Limited, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Embedded Multimedia Security Systems Algorithms And Architectures. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Debbabi, Mourad, Chamseddine Talhi, Sami Zhioua, and Mohamed Saleh. Embedded Java Security: Security for Mobile Devices. Springer London, Limited, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Debbabi, Mourad, Chamseddine Talhi, Sami Zhioua, and Mohamed Saleh. Embedded Java Security: Security for Mobile Devices. Springer, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

(Editor), Nadia Nedjah, Luiza De Macedo Mourelle (Editor), and Luiza De Macedo Mourelle (Editor), eds. Embedded Cryptographic Hardware: Design & Security. Nova Science Publishers, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Embedded Security in Cars: Securing Current and Future Automotive IT Applications. Springer, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!