J Harrison, N Asadizanjani, M Tehranipoor - Integration, 2021 - Elsevier
The PCB supply chain has become globally distributed such that PCBs are vulnerable to hardware Trojan attacks. Moreover, attacks on PCBs are possible even after a system is …
Internet of things (IoT) is considered as a collection of heterogeneous devices, such as sensors, Radio-frequency identification (RFID) and actuators, which form a huge network …
H Peng, M Payer - 29th USENIX Security Symposium (USENIX Security …, 2020 - usenix.org
The Universal Serial Bus (USB) connects external devices to a host. This interface exposes the OS kernels and device drivers to attacks by malicious devices. Unfortunately, kernels …
This book was written in response to the rising numbers of students, who for a range of reasons, were opting to conduct secondary research but finding it challenging to find a book …
Y Ahmed, AT Asyhari… - Computers, Materials and …, 2021 - research.monash.edu
The number of cybersecurity incidents is on the rise despite significant investment in security measures. The existing conventional security approaches have demonstrated limited …
In this digital, internet-based world, it is not new to face cyber attacks from time to time. A number of heavy viruses have been made by hackers, and they have successfully given big …
Z Masood, R Samar, MAZ Raja - Computers & Security, 2019 - Elsevier
The purpose of this study is to develop an epidemic virus model that portrays the spread of the Stuxnet virus in a critical control infrastructure after bridging the air-gap between a …
Security attacks are growing in an exponential manner and their impact on existing systems is seriously high and can lead to dangerous consequences. However, in order to reduce the …
For a reliable and convenient system, it is essential to build a secure system that will be protected from outer attacks and also serve the purpose of keeping the inner data safe from …