<Record><identifier xmlns="http://purl.org/dc/elements/1.1/">URN:NBN:SI:DOC-FIR2R0LF</identifier><date>2017</date><creator>Devi M., Nirmala</creator><creator>Ranjani R., Sree</creator><relation>documents/doc/F/URN_NBN_SI_doc-FIR2R0LF_001.pdf</relation><relation>documents/doc/F/URN_NBN_SI_doc-FIR2R0LF_001.txt</relation><format format_type="issue">1/2</format><format format_type="volume">84</format><format format_type="type">article</format><format format_type="extent">str. 7-16</format><identifier identifier_type="ISSN">0013-5852</identifier><identifier identifier_type="COBISSID">298517760</identifier><identifier identifier_type="URN">URN:NBN:SI:doc-FIR2R0LF</identifier><language>eng</language><publisher>Strokovna zadruga koncesijoniranih elektrotehnikov</publisher><source>Elektrotehniški vestnik</source><rights>InC</rights><subject language_type_id="slv">integrirana vezja</subject><subject language_type_id="eng">security</subject><subject language_type_id="slv">strojna oprema</subject><subject language_type_id="slv">varnost</subject><title>an analysis</title><title>Malicious hardware detection and design for trust</title></Record>