نتایج جستجو برای: teke horse
تعداد نتایج: 14929 فیلتر نتایج به سال:
Malicious hardware is a fairly new research topic that has attracted the interest of the scientific community. Therefore, numerous approaches have been proposed in the last years to counter the threat of so-called hardware Trojans. This chapter describes malicious hardware in the context of the security of hardware infrastructure components. Network infrastructure plays a vital role in our ever...
The phylogenetic relationship between Equus przewalskii and E. caballus is often a matter of debate. Although these taxa have different chromosome numbers, they do not form monophyletic clades in a phylogenetic tree based on mtDNA sequences. Here we report sequence variation from five newly identified Y chromosome regions of the horse. Two fixed nucleotide differences on the Y chromosome clearl...
Two horsemen are on a forest path chatting about something. A passerby M , the mischief maker, comes along and having plenty of time and a desire for amusement, suggests that they race against each other to a tree a short distance away and he will give a prize of $100. However, there is an interesting twist. He will give the $100 to the owner of the slower horse. Let us call the two horsemen Bi...
Hardware design houses are increasingly outsourcing designs to be manufactured by cheaper fabrication facilities due to economic factors and market forces. This raises the question of trustable manufactured products for highly sensitive applications. One such type of trust issue is the possible incorporation of Trojan circuits into the IC with the goal of tampering with IC reliability and haste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید