Author of the publication

A Survey on Attack Cases Exploiting Computer Architectural Vulnerabilities.

, , , , , and . IMIS, volume 994 of Advances in Intelligent Systems and Computing, page 834-844. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unintended Certificate Installation into Remote IoT Nodes., , , , and . IMIS, volume 994 of Advances in Intelligent Systems and Computing, page 845-854. Springer, (2019)Study on Signature Verification Process for the Firmware of an Android Platform., , , , and . IMIS, volume 773 of Advances in Intelligent Systems and Computing, page 540-545. Springer, (2018)A Survey on Attack Cases Exploiting Computer Architectural Vulnerabilities., , , , , and . IMIS, volume 994 of Advances in Intelligent Systems and Computing, page 834-844. Springer, (2019)Vulnerability analysis of secure USB: based on the fingerprint authentication of product B., , , and . RACS, page 167-169. ACM, (2018)