Login / Signup
Combating Memory Corruption Attacks On Scada Devices.
Carlo Bellettini
Julian L. Rrushi
Published in:
Critical Infrastructure Protection (2008)
Keyphrases
</>
data corruption
mobile devices
memory usage
memory requirements
control system
countermeasures
memory space
main memory
law enforcement
key management
malicious attacks
data structure
real time
information systems
security protocols
spam filters
malicious users
neural network