Login / Signup
Hardware Security Vulnerability Assessment to Identify the Potential Risks in A Critical Embedded Application.
Zahra Kazemi
Mahdi Fazeli
David Hély
Vincent Beroulle
Published in:
IOLTS (2020)
Keyphrases
</>
risk assessment
real time
low cost
risk analysis
network connection
network security
security risks
information security
embedded systems
decision making
buffer overflow
risk factors
statistical databases
risk management
control software
intrusion detection
signal processing