Author of the publication

Vulnerability Assessment of the Rowhammer Attack Using Machine Learning and the gem5 Simulator - Work in Progress.

, , , , and . SAT-CPS@CODASPY, page 104-109. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Power management through DVFS and dynamic body biasing in FD-SOI circuits., , , , , , and . DAC, page 183:1-183:6. ACM, (2014)Metrics for Digital Signal Processing Architectures Characterization: Remanence and Scalability., , , , , and . SAMOS, volume 3133 of Lecture Notes in Computer Science, page 128-137. Springer, (2004)Computing reliability: On the differences between software testing and software fault injection techniques., , , , , and . Microprocess. Microsystems, (2017)Convergence analysis of run-time distributed optimization on adaptive systems using game theory., , , , and . FPL, page 555-558. IEEE, (2008)Adaptive Power monitoring for self-aware embedded systems., , , , and . NORCAS, page 1-4. IEEE, (2015)Methodology for Power Mode selection in FD-SOI circuits with DVFS and Dynamic Body Biasing., , , , , and . PATMOS, page 199-206. IEEE, (2013)Wallance, an Alternative to Blockchain for IoT., , , and . WF-IoT, page 1-6. IEEE, (2020)An Introduction to Multi-Core System on Chip - Trends and Challenges., , , , , and . Multiprocessor System-on-Chip, Springer, (2011)Teaching Hardware Security: Earnings of an Introduction Proposed as an Escape Game., , , , , and . REV, volume 1231 of Advances in Intelligent Systems and Computing, page 729-741. Springer, (2020)Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level., , , , , , , , , and 1 other author(s). EuroS&P Workshops, page 96-102. IEEE, (2021)