Linked e-resources

Details

Part I. Threat Modelling of Hardware Supply Chain
Chapter 1. CIST: A Threat Modelling Approach for Hardware Supply Chain Security
Part II. Emerging Hardware-based Security Attacks and Countermeasures
Chapter 2. A Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon
Chapter 3. Anti-counterfeiting Techniques for Resources-Constrained Devices
Part III. Anomaly Detection in Embedded Systems
Chapter 4. Anomalous Behaviour in Embedded Systems
Chapter 5. Hardware Performance Counters (HPCs) for Anomaly Detection
Chapter 6. Anomaly Detection in an Embedded System.

Browse Subjects

Show more subjects...

Statistics

from
to
Export