Rethinking Memory Permissions for Protection Against Cross-Layer Attacks.
Jesse ElwellRyan RileyNael B. Abu-GhazalehDmitry V. PonomarevIliano CervesatoPublished in: ACM Trans. Archit. Code Optim. (2016)
Keyphrases
- cross layer
- wireless networks
- video streaming
- application layer
- multi layer
- mobile ad hoc networks
- quality of service
- routing protocol
- multimedia services
- access control
- ddos attacks
- scalable video
- real time
- qos requirements
- low complexity
- scheduling algorithm
- end to end
- video streams
- image quality
- response time
- mobile devices