Login / Signup

Thwarting Control Plane Attacks with Displaced and Dilated Address Spaces.

Lauren BiernackiMark GallagherValeria BertaccoTodd M. Austin
Published in: HOST (2020)
Keyphrases
  • control system
  • control method
  • data acquisition
  • control strategy
  • digital images
  • computer security
  • control theory
  • malicious attacks