Author:
Bellovin Steven M.,Lin Herbert S.
Reference28 articles.
1. Designing and Implementing Malicious Hardware;S King;LEET'08 Proceedings of the 1 st Unenix Workshop on Large-Scale Exploits and Emergent Threats,2008
2. How Blockchain Could Disrupt Wall Street!
3. Protection from Chernobyl virus
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献