Author of the publication

Exploring the Coverage of Existing Hardware Vulnerabilities in Community Standards.

, , and . SVCC, volume 1383 of Communications in Computer and Information Science, page 87-97. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DVFT: A Lightweight Solution for Power-Supply Noise-Based TRNG Using Dynamic Voltage Feedback Tuning System., , , , and . IEEE Trans. Very Large Scale Integr. Syst., 26 (6): 1084-1097 (2018)Low-cost authentication paradigm for consumer electronics within the internet of wearable fitness tracking applications., , , and . ICCE, page 1-6. IEEE, (2018)Translation of AADL model to security attack tree (TAMSAT) to SMART evaluation of monetary security risk., and . Inf. Secur. J. A Glob. Perspect., 32 (4): 297-313 (July 2023)An active storage framework for object storage devices., , , and . MSST, page 1-12. IEEE Computer Society, (2012)Exploring the Coverage of Existing Hardware Vulnerabilities in Community Standards., , and . SVCC, volume 1383 of Communications in Computer and Information Science, page 87-97. Springer, (2020)Evolving authentication design considerations for the internet of biometric things (IoBT)., , and . CODES+ISSS, page 10:1-10:10. ACM, (2016)Proposing a modeling framework for minimizing security vulnerabilities in IoT systems in the healthcare domain., , , and . BHI, page 185-188. IEEE, (2017)P2M-based security model: security enhancement using combined PUF and PRNG models for authenticating consumer electronic devices., , , and . IET Comput. Digit. Tech., 12 (6): 289-296 (2018)A framework for evaluating security risk in system design., and . Discov. Internet Things, (2022)SMART: security model adversarial risk-based tool for systems security design evaluation., and . J. Cybersecur., 6 (1): tyaa003 (2020)