From post

Cognitive Countermeasures against BAD USB.

, , , и . BWCCA, том 2 из Lecture Notes on Data Engineering and Communications Technologies, стр. 377-386. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Study on a Secure USB Mechanism That Prevents the Exposure of Authentication Information for Smart Human Care Services., , , , , и . J. Sensors, (2018)Mitigating write interference on SSD in home cloud server., , и . ICCE, стр. 1-3. IEEE, (2018)Analysis on the Key Storage Mechanism of the CNG Library., , , и . IMIS, стр. 499-502. IEEE Computer Society, (2016)Security Assessment of the Image-Based Authentication Using Screen-Capture Tools., , , , и . IMIS, том 612 из Advances in Intelligent Systems and Computing, стр. 156-161. Springer, (2017)Security Assessment on the Mouse Data using Mouse Loggers., , , и . BWCCA, том 2 из Lecture Notes on Data Engineering and Communications Technologies, стр. 387-393. Springer, (2016)Cognitive Countermeasures against BAD USB., , , и . BWCCA, том 2 из Lecture Notes on Data Engineering and Communications Technologies, стр. 377-386. Springer, (2016)A Brief Review on JTAG Security., , , и . IMIS, стр. 486-490. IEEE Computer Society, (2016)