Hardware-based cyber threats: attack vectors and defence techniques.
Reza MontasariRichard HillSimon ParkinsonAlireza DaneshkhahAmin Hosseinian FarPublished in: Int. J. Electron. Secur. Digit. Forensics (2020)
Keyphrases
- cyber security
- cyber attacks
- countermeasures
- cyber defense
- cyber crime
- national security
- denial of service attacks
- malicious attacks
- low cost
- intrusion detection
- security breaches
- attack scenarios
- smart grid
- security measures
- critical infrastructure
- hardware and software
- data corruption
- hardware implementation
- security vulnerabilities
- vector space
- computer systems
- real time
- intrusion detection system
- security issues
- attack detection
- injection attacks
- information security
- insider attacks
- security risks
- image processing
- agent oriented
- privacy issues
- massively parallel
- computing systems
- feature vectors
- vlsi implementation
- embedded systems
- communication networks
- buffer overflow
- network traffic
- information sharing
- data mining