Inproceedings,

Various Threat Models to Circumvent Air-Gapped Systems for Preventing Network Attack.

, , and .
WISA, volume 9503 of Lecture Notes in Computer Science, page 187-199. Springer, (2015)

Meta data

Tags

Users

  • @dblp

Comments and Reviews