Journal article 877 views
Hardware-Based Cyber Threats: Attack Vectors and Defence Techniques
International Journal of Electronic Security and Digital Forensics, Volume: 12, Issue: 1, Start page: 1
Swansea University Author: Reza Montasari
Full text not available from this repository: check for access using links below.
DOI (Published version): 10.1504/ijesdf.2020.10029857
Abstract
Hardware-Based Cyber Threats: Attack Vectors and Defence Techniques
Published in: | International Journal of Electronic Security and Digital Forensics |
---|---|
ISSN: | 1751-911X 1751-9128 |
Published: |
Inderscience Publishers
2020
|
Online Access: |
Check full text
|
URI: | https://cronfa.swan.ac.uk/Record/cronfa54937 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
first_indexed |
2020-09-15T14:08:18Z |
---|---|
last_indexed |
2020-12-03T04:09:49Z |
id |
cronfa54937 |
recordtype |
SURis |
fullrecord |
<?xml version="1.0"?><rfc1807><datestamp>2020-12-02T17:55:59.2166144</datestamp><bib-version>v2</bib-version><id>54937</id><entry>2020-08-11</entry><title>Hardware-Based Cyber Threats: Attack Vectors and Defence Techniques</title><swanseaauthors><author><sid>e420369ac98aaaa7f39248e39a847af1</sid><ORCID>0000-0001-7136-6753</ORCID><firstname>Reza</firstname><surname>Montasari</surname><name>Reza Montasari</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2020-08-11</date><deptcode>CSSP</deptcode><abstract/><type>Journal Article</type><journal>International Journal of Electronic Security and Digital Forensics</journal><volume>12</volume><journalNumber>1</journalNumber><paginationStart>1</paginationStart><paginationEnd/><publisher>Inderscience Publishers</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint>1751-911X</issnPrint><issnElectronic>1751-9128</issnElectronic><keywords>side channels; microarchitectural attacks; cyber threats; hardware attacks; embedded systems; digital investigations; countermeasures</keywords><publishedDay>1</publishedDay><publishedMonth>1</publishedMonth><publishedYear>2020</publishedYear><publishedDate>2020-01-01</publishedDate><doi>10.1504/ijesdf.2020.10029857</doi><url/><notes/><college>COLLEGE NANME</college><department>Criminology, Sociology and Social Policy</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>CSSP</DepartmentCode><institution>Swansea University</institution><apcterm/><lastEdited>2020-12-02T17:55:59.2166144</lastEdited><Created>2020-08-11T00:51:37.8161895</Created><path><level id="1">Faculty of Humanities and Social Sciences</level><level id="2">Hilary Rodham Clinton School of Law</level></path><authors><author><firstname>Alireza</firstname><surname>Daneshkhah</surname><order>1</order></author><author><firstname>Simon</firstname><surname>Parkinson</surname><order>2</order></author><author><firstname>Richard</firstname><surname>Hill</surname><order>3</order></author><author><firstname>Reza</firstname><surname>Montasari</surname><orcid>0000-0001-7136-6753</orcid><order>4</order></author><author><firstname>Amin Hosseinian</firstname><surname>Far</surname><order>5</order></author></authors><documents/><OutputDurs/></rfc1807> |
spelling |
2020-12-02T17:55:59.2166144 v2 54937 2020-08-11 Hardware-Based Cyber Threats: Attack Vectors and Defence Techniques e420369ac98aaaa7f39248e39a847af1 0000-0001-7136-6753 Reza Montasari Reza Montasari true false 2020-08-11 CSSP Journal Article International Journal of Electronic Security and Digital Forensics 12 1 1 Inderscience Publishers 1751-911X 1751-9128 side channels; microarchitectural attacks; cyber threats; hardware attacks; embedded systems; digital investigations; countermeasures 1 1 2020 2020-01-01 10.1504/ijesdf.2020.10029857 COLLEGE NANME Criminology, Sociology and Social Policy COLLEGE CODE CSSP Swansea University 2020-12-02T17:55:59.2166144 2020-08-11T00:51:37.8161895 Faculty of Humanities and Social Sciences Hilary Rodham Clinton School of Law Alireza Daneshkhah 1 Simon Parkinson 2 Richard Hill 3 Reza Montasari 0000-0001-7136-6753 4 Amin Hosseinian Far 5 |
title |
Hardware-Based Cyber Threats: Attack Vectors and Defence Techniques |
spellingShingle |
Hardware-Based Cyber Threats: Attack Vectors and Defence Techniques Reza Montasari |
title_short |
Hardware-Based Cyber Threats: Attack Vectors and Defence Techniques |
title_full |
Hardware-Based Cyber Threats: Attack Vectors and Defence Techniques |
title_fullStr |
Hardware-Based Cyber Threats: Attack Vectors and Defence Techniques |
title_full_unstemmed |
Hardware-Based Cyber Threats: Attack Vectors and Defence Techniques |
title_sort |
Hardware-Based Cyber Threats: Attack Vectors and Defence Techniques |
author_id_str_mv |
e420369ac98aaaa7f39248e39a847af1 |
author_id_fullname_str_mv |
e420369ac98aaaa7f39248e39a847af1_***_Reza Montasari |
author |
Reza Montasari |
author2 |
Alireza Daneshkhah Simon Parkinson Richard Hill Reza Montasari Amin Hosseinian Far |
format |
Journal article |
container_title |
International Journal of Electronic Security and Digital Forensics |
container_volume |
12 |
container_issue |
1 |
container_start_page |
1 |
publishDate |
2020 |
institution |
Swansea University |
issn |
1751-911X 1751-9128 |
doi_str_mv |
10.1504/ijesdf.2020.10029857 |
publisher |
Inderscience Publishers |
college_str |
Faculty of Humanities and Social Sciences |
hierarchytype |
|
hierarchy_top_id |
facultyofhumanitiesandsocialsciences |
hierarchy_top_title |
Faculty of Humanities and Social Sciences |
hierarchy_parent_id |
facultyofhumanitiesandsocialsciences |
hierarchy_parent_title |
Faculty of Humanities and Social Sciences |
department_str |
Hilary Rodham Clinton School of Law{{{_:::_}}}Faculty of Humanities and Social Sciences{{{_:::_}}}Hilary Rodham Clinton School of Law |
document_store_str |
0 |
active_str |
0 |
published_date |
2020-01-01T04:08:48Z |
_version_ |
1763753620170342400 |
score |
11.037319 |