Login / Signup
End-to-End Automated Exploit Generation for Processor Security Validation.
Rui Zhang
Calvin Deutschbein
Peng Huang
Cynthia Sturton
Published in:
IEEE Des. Test (2021)
Keyphrases
</>
end to end
high bandwidth
information security
congestion control
ad hoc networks
multipath
wireless ad hoc networks
admission control
transport layer
access control
coding scheme
intrusion detection
high speed
key management
rate allocation
multi hop
scalable video
parallel architectures