Detecting Peripheral-based Attacks on the Host Memory
This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals g...
        Сохранить в:
      
    
                  | Главный автор: | |
|---|---|
| Соавтор: | |
| Формат: | Электронный ресурс eКнига | 
| Язык: | English | 
| Опубликовано: | 
      Cham :
        Springer International Publishing : Imprint: Springer,
    
      2015.
     | 
| Редактирование: | 1st ed. 2015. | 
| Серии: | T-Labs Series in Telecommunication Services,
             | 
| Предметы: | |
| Online-ссылка: | https://doi.org/10.1007/978-3-319-13515-1 | 
| Метки: | 
       Добавить метку    
     
      Нет меток, Требуется 1-ая метка записи!
    | 



