Loading…
Introduction to the Special Issue on the Digital Threats of Hardware Security
Saved in:
Published in: | Digital threats (Print) 2023-08, Vol.4 (2), p.1-2, Article 16 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 2 |
container_issue | 2 |
container_start_page | 1 |
container_title | Digital threats (Print) |
container_volume | 4 |
creator | Aysu, Aydin Graham, Scott R. |
description | |
doi_str_mv | 10.1145/3585011 |
format | article |
fullrecord | <record><control><sourceid>acm_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1145_3585011</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3585011</sourcerecordid><originalsourceid>FETCH-LOGICAL-a206t-7fcf6e2404c19d45e5f85d998413aaf3e3e05ddcd8a1e1c31f1430dd3b9f55fa3</originalsourceid><addsrcrecordid>eNo9kE1LAzEQhoMoWGrx7ik3T6uZJJNujlI_ulDxYD0vMR820nZLkkX6793S6mmG531mDi8h18DuACTeC6yRAZyREcepqlCI6fmwK80rUFxdkknO34wxLkDWqEfktdmW1LnelthtaeloWXn6vvM2mjVtcu49PfABPsavWAa4XCVvSqZdoHOT3I9Jw4G3fYplf0UugllnPznNMfl4flrO5tXi7aWZPSwqw5kq1TTYoDyXTFrQTqLHUKPTupYgjAnCC8_QOetqAx6sgABSMOfEpw6IwYgxuT3-tanLOfnQ7lLcmLRvgbWHItpTEYN5czSN3fxLf-Evs-tYAQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Introduction to the Special Issue on the Digital Threats of Hardware Security</title><source>ACM Digital Library Complete</source><creator>Aysu, Aydin ; Graham, Scott R.</creator><creatorcontrib>Aysu, Aydin ; Graham, Scott R.</creatorcontrib><identifier>ISSN: 2692-1626</identifier><identifier>EISSN: 2576-5337</identifier><identifier>DOI: 10.1145/3585011</identifier><language>eng</language><publisher>New York, NY: ACM</publisher><subject>Security and privacy ; Security and privacy / Cryptography ; Security and privacy / Cryptography / Cryptanalysis and other attacks ; Security and privacy / Intrusion/anomaly detection and malware mitigation ; Security and privacy / Systems security ; Security and privacy / Systems security / Operating systems security ; Social and professional topics ; Social and professional topics / Computing / technology policy ; Social and professional topics / Computing / technology policy / Computer crime</subject><ispartof>Digital threats (Print), 2023-08, Vol.4 (2), p.1-2, Article 16</ispartof><rights>Copyright held by the owner/author(s).</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><orcidid>0000-0003-0193-1192 ; 0000-0002-5530-8710</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://dl.acm.org/doi/pdf/10.1145/3585011$$EPDF$$P50$$Gacm$$Hfree_for_read</linktopdf><link.rule.ids>314,780,784,2282,27924,27925,40196,76228</link.rule.ids></links><search><creatorcontrib>Aysu, Aydin</creatorcontrib><creatorcontrib>Graham, Scott R.</creatorcontrib><title>Introduction to the Special Issue on the Digital Threats of Hardware Security</title><title>Digital threats (Print)</title><addtitle>ACM DTRAP</addtitle><subject>Security and privacy</subject><subject>Security and privacy / Cryptography</subject><subject>Security and privacy / Cryptography / Cryptanalysis and other attacks</subject><subject>Security and privacy / Intrusion/anomaly detection and malware mitigation</subject><subject>Security and privacy / Systems security</subject><subject>Security and privacy / Systems security / Operating systems security</subject><subject>Social and professional topics</subject><subject>Social and professional topics / Computing / technology policy</subject><subject>Social and professional topics / Computing / technology policy / Computer crime</subject><issn>2692-1626</issn><issn>2576-5337</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><recordid>eNo9kE1LAzEQhoMoWGrx7ik3T6uZJJNujlI_ulDxYD0vMR820nZLkkX6793S6mmG531mDi8h18DuACTeC6yRAZyREcepqlCI6fmwK80rUFxdkknO34wxLkDWqEfktdmW1LnelthtaeloWXn6vvM2mjVtcu49PfABPsavWAa4XCVvSqZdoHOT3I9Jw4G3fYplf0UugllnPznNMfl4flrO5tXi7aWZPSwqw5kq1TTYoDyXTFrQTqLHUKPTupYgjAnCC8_QOetqAx6sgABSMOfEpw6IwYgxuT3-tanLOfnQ7lLcmLRvgbWHItpTEYN5czSN3fxLf-Evs-tYAQ</recordid><startdate>20230810</startdate><enddate>20230810</enddate><creator>Aysu, Aydin</creator><creator>Graham, Scott R.</creator><general>ACM</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0003-0193-1192</orcidid><orcidid>https://orcid.org/0000-0002-5530-8710</orcidid></search><sort><creationdate>20230810</creationdate><title>Introduction to the Special Issue on the Digital Threats of Hardware Security</title><author>Aysu, Aydin ; Graham, Scott R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a206t-7fcf6e2404c19d45e5f85d998413aaf3e3e05ddcd8a1e1c31f1430dd3b9f55fa3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Security and privacy</topic><topic>Security and privacy / Cryptography</topic><topic>Security and privacy / Cryptography / Cryptanalysis and other attacks</topic><topic>Security and privacy / Intrusion/anomaly detection and malware mitigation</topic><topic>Security and privacy / Systems security</topic><topic>Security and privacy / Systems security / Operating systems security</topic><topic>Social and professional topics</topic><topic>Social and professional topics / Computing / technology policy</topic><topic>Social and professional topics / Computing / technology policy / Computer crime</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Aysu, Aydin</creatorcontrib><creatorcontrib>Graham, Scott R.</creatorcontrib><collection>CrossRef</collection><jtitle>Digital threats (Print)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Aysu, Aydin</au><au>Graham, Scott R.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Introduction to the Special Issue on the Digital Threats of Hardware Security</atitle><jtitle>Digital threats (Print)</jtitle><stitle>ACM DTRAP</stitle><date>2023-08-10</date><risdate>2023</risdate><volume>4</volume><issue>2</issue><spage>1</spage><epage>2</epage><pages>1-2</pages><artnum>16</artnum><issn>2692-1626</issn><eissn>2576-5337</eissn><cop>New York, NY</cop><pub>ACM</pub><doi>10.1145/3585011</doi><tpages>2</tpages><orcidid>https://orcid.org/0000-0003-0193-1192</orcidid><orcidid>https://orcid.org/0000-0002-5530-8710</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2692-1626 |
ispartof | Digital threats (Print), 2023-08, Vol.4 (2), p.1-2, Article 16 |
issn | 2692-1626 2576-5337 |
language | eng |
recordid | cdi_crossref_primary_10_1145_3585011 |
source | ACM Digital Library Complete |
subjects | Security and privacy Security and privacy / Cryptography Security and privacy / Cryptography / Cryptanalysis and other attacks Security and privacy / Intrusion/anomaly detection and malware mitigation Security and privacy / Systems security Security and privacy / Systems security / Operating systems security Social and professional topics Social and professional topics / Computing / technology policy Social and professional topics / Computing / technology policy / Computer crime |
title | Introduction to the Special Issue on the Digital Threats of Hardware Security |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T08%3A11%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-acm_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Introduction%20to%20the%20Special%20Issue%20on%20the%20Digital%20Threats%20of%20Hardware%20Security&rft.jtitle=Digital%20threats%20(Print)&rft.au=Aysu,%20Aydin&rft.date=2023-08-10&rft.volume=4&rft.issue=2&rft.spage=1&rft.epage=2&rft.pages=1-2&rft.artnum=16&rft.issn=2692-1626&rft.eissn=2576-5337&rft_id=info:doi/10.1145/3585011&rft_dat=%3Cacm_cross%3E3585011%3C/acm_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-a206t-7fcf6e2404c19d45e5f85d998413aaf3e3e05ddcd8a1e1c31f1430dd3b9f55fa3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |