Author:
Nimgaonkar Satyajeet,Gomathisankaran Mahadevan,Mohanty Saraju P.
Subject
Hardware and Architecture,Software
Reference37 articles.
1. Mobile and Smart Device Security Survey, 2011. Available from: .
2. Analyzing the energy consumption of security protocols;Potlapally,2003
3. C. Cowan, F. Wagle, C. Pu, S. Beattie, J. Walpole, Buffer overflows: attacks and defenses for the vulnerability of the decade, in: DARPA Information Survivability Conference and Exposition, 2000, DISCEX ’00, Proceedings, vol. 2, 2000, pp. 119–129. doi:10.1109/DISCEX.2000.821514.
4. Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software;Shao;IEEE Transactions on Computers,2006
5. Abyss: an architecture for software protection;White;IEEE Transactions on Software Engineering,1990
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献