%PDF-1.5 % 1 0 obj << /S /GoTo /D (section.1) >> endobj 4 0 obj (Introduction) endobj 5 0 obj << /S /GoTo /D (section.2) >> endobj 8 0 obj (Analysis of the relevant literature) endobj 9 0 obj << /S /GoTo /D (section.3) >> endobj 12 0 obj (Technique for design of secure embedded devices) endobj 13 0 obj << /S /GoTo /D (section.4) >> endobj 16 0 obj (Requirements for the developed integrated system for cyber-physical security) endobj 17 0 obj << /S /GoTo /D (section.5) >> endobj 20 0 obj (Application of the technique) endobj 21 0 obj << /S /GoTo /D (subsection.5.1) >> endobj 24 0 obj (Application of the technique to select components of hardware interfaces) endobj 25 0 obj << /S /GoTo /D (subsection.5.2) >> endobj 28 0 obj (The application of the technique to select hub components) endobj 29 0 obj << /S /GoTo /D (section.6) >> endobj 32 0 obj (Description of the designed integrated cyber-physical security system) endobj 33 0 obj << /S /GoTo /D (section.7) >> endobj 36 0 obj (Discussion) endobj 37 0 obj << /S /GoTo /D (section.8) >> endobj 40 0 obj (Conclusion) endobj 41 0 obj << /S /GoTo /D [42 0 R /Fit] >> endobj 45 0 obj << /Length 2870 /Filter /FlateDecode >> stream xڍYK۶ϯВ:3qֵ"ɂ0 S@p ~,ڄIy|d&aV[sl( mx:5Ө>{o6JϦNwuumT0/xg߇f0}9\F{&L:3\w>l/"DOpS3{WZS_B1l{%zkҞcmxوGgӟ*A7&,/z/I7/R PY<T~LI.UݙM{A, ھgKŅ)\]I|mqKAEcUwtδ`UL=4<+=1Yh$?B3$/TRŢ*a,2Bp58&Y;Nȗ[?݊ďbs[xV1LaY8u4k՞|q(SMiJ!i`({;e5L[SH0ceByBJ7bE]M0.4a)-C i5ZT/ ƺY% @j(N.īit3-Fzxֺpfj_> 豲fXs۴)}F'P M 2T¿lA?L̑huoFmNh$0RPMsaZ