Detecting Peripheral-based Attacks on the Host Memory
This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals g...
        Saved in:
      
    
                  | Príomhúdar: | |
|---|---|
| Údar Corparáideach: | |
| Formáid: | Leictreonach ríomhLeabhar | 
| Teanga: | English | 
| Foilsithe: | 
      Cham :
        Springer International Publishing : Imprint: Springer,
    
      2015.
     | 
| Eagrán: | 1st ed. 2015. | 
| Sraith: | T-Labs Series in Telecommunication Services,
             | 
| Ábhair: | |
| Rochtain Ar Líne: | https://doi.org/10.1007/978-3-319-13515-1 | 
| Clibeanna: | 
       Cuir Clib Leis    
     
      Gan Chlibeanna, Bí ar an gcéad duine leis an taifead seo a chlibeáil!
    | 



