- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
This book focuses on how real-time task schedules for reconfigurable hardware-based embedded platforms may be affected due to the vulnerability of hardware and proposes self-aware security strategies to counteract the various threats. However, such real-time task schedules may be jeopardized due to hardware threats.



