Author of the publication

A Survey on Attack Cases Exploiting Computer Architectural Vulnerabilities.

, , , , , and . IMIS, volume 994 of Advances in Intelligent Systems and Computing, page 834-844. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MBR Image Automation Analysis Techniques Utilizing Emulab., and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 213-220. Springer, (2017)Instant attack stopper in InfiniBand architecture., and . CCGRID, page 105-110. IEEE Computer Society, (2005)Performance Analysis of the Guaranteed Bandwidth Services for Large File Transmission., , , , and . PDPTA, page 1198-1201. CSREA Press, (2003)Machine Learning based Malware Detection with the 2019 KISA Data Challenge Dataset., , , and . ICEA, page 49:1-49:4. ACM, (2020)I2SEMS: Interconnects-Independent Security Enhanced Shared Memory Multiprocessor Systems., , and . PACT, page 94-103. IEEE Computer Society, (2007)SNMP-Based Detection of VLAN Hopping Attack Risk., and . ICISA, volume 514 of Lecture Notes in Electrical Engineering, page 267-272. Springer, (2018)ARTAS: automatic research trend analysis system for information security., and . SAC, page 361-368. ACM, (2020)Efficient Data Packet Compression for Cache Coherent Multiprocessor Systems., , , and . DCC, page 129-138. IEEE Computer Society, (2012)A Source Identification Scheme against DDoS Attacks in Cluster Interconnects., , and . ICPP Workshops, page 354-361. IEEE Computer Society, (2004)Security Enhancement in InfiniBand Architecture., , and . IPDPS, IEEE Computer Society, (2005)