Detecting peripheral-based attacks on the host memory
This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals g...
| Tác giả chính: | |
|---|---|
| Tác giả của công ty: | |
| Định dạng: | Electronic Resource |
| Ngôn ngữ: | English |
| Được phát hành: |
Cham
Springer International Publishing
[2015]
|
| Những chủ đề: | |
| Truy cập trực tuyến: | Available for University of the Philippines System via SpringerLink. Click here to access Also available remotely for University of the Philippines System via SpringerLink. Click here to access thru EZproxy |


