Login / Signup
Security Evaluation of Thermal Covert-channels on SmartSSDs.
Theodoros Trochatos
Anthony Etim
Jakub Szefer
Published in:
CoRR (2023)
Keyphrases
</>
information flow
neural network
data mining
infrared
information security
evaluation metrics
data sets
evaluation methods
functional requirements
access control
intrusion detection
evaluation method
security issues
security requirements
security protocols