C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Hardware Security Vulnerability Assessment to Identify the Potential Risks in A Critical Embedded Application.
Zahra Kazemi
Mahdi Fazeli
David Hély
Vincent Beroulle
Published in:
IOLTS (2020)
Keyphrases
</>
risk assessment
real time
low cost
risk analysis
network connection
network security
security risks
information security
embedded systems
decision making
buffer overflow
risk factors
statistical databases
risk management
control software
intrusion detection
signal processing