Login / Signup
A Survey on Attack Cases Exploiting Computer Architectural Vulnerabilities.
Kwangjun Kim
HeeDong Yang
Byeonggeun Son
Hanjae Yoon
Kangbin Yim
Manhee Lee
Published in:
IMIS (2019)
Keyphrases
</>
countermeasures
attack graph
attack graphs
computer systems
security vulnerabilities
computer viruses
security risks
denial of service
dos attacks
detection mechanism
high level
wireless sensor networks
data corruption
attack scenarios
buffer overflow