Security and Vulnerability Implications of 3D ICs.
Yang XieChongxi BaoCaleb SerafyTiantao LuAnkur SrivastavaMark M. TehranipoorPublished in: IEEE Trans. Multi Scale Comput. Syst. (2016)
Keyphrases
- security vulnerabilities
- risk assessment
- buffer overflow
- security risks
- intrusion detection
- network security
- security systems
- access control
- information security
- security problems
- neural network
- security requirements
- data mining
- security analysis
- statistical databases
- data security
- sensitive data
- social networks
- penetration testing
- information assurance
- security mechanisms
- security threats
- malware detection
- data integrity
- computer security
- real time
- data sets