1
by Daniotti, Bruno.
Published 2019
Format:
Table of Contents: ...-design Phase -- 3.2 Schematic Design Phase -- 3.3 Design Development Phase....
Click to View
2
by Karner, Michael.
Published 2024
Format:
Table of Contents: ... Attacks -- 3.1 Confidentiality and Privacy Threats -- 3.2 Integrity-Based Attacks -- 3.3 Availability -- 4...
Click to View
3
by Abe, Seiji.
Published 2018
Format:
Table of Contents: ... Society -- 2.3.2 Information Security in the Information Society -- 2.3.3 AI and Safety and Security...
Click to View