Login / Signup
Hardware Covert Attacks and Countermeasures.
Jahnabi Phukan
Kin Fun Li
Fayez Gebali
Published in:
AINA (2016)
Keyphrases
</>
countermeasures
information security
low cost
cyber attacks
rural areas
information flow
computer systems
java card
information systems
security breaches
data acquisition
software engineering
traffic accidents
security issues
terrorist networks
security measures
power analysis
real world