Login / Signup
Process Table Covert Channels: Exploitation and Countermeasures.
Jean-Michel Cioranesco
Houda Ferradi
Rémi Géraud
David Naccache
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
countermeasures
information security
databases
case study
knowledge discovery