Detecting Peripheral-based Attacks on the Host Memory

This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals g...

Cur síos iomlán

Saved in:
Sonraí Bibleagrafaíochta
Príomhúdar: Stewin, Patrick. (Údar, http://id.loc.gov/vocabulary/relators/aut)
Údar Corparáideach: SpringerLink (Online service)
Formáid: Leictreonach ríomhLeabhar
Teanga:English
Foilsithe: Cham : Springer International Publishing : Imprint: Springer, 2015.
Eagrán:1st ed. 2015.
Sraith:T-Labs Series in Telecommunication Services,
Ábhair:
Rochtain Ar Líne:https://doi.org/10.1007/978-3-319-13515-1
Clibeanna: Cuir Clib Leis
Gan Chlibeanna, Bí ar an gcéad duine leis an taifead seo a chlibeáil!