Countermeasure (computer)

In computer security a countermeasure is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a transformative approach for providing… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
Is this relevant?
Review
2017
Review
2017
1Department of Computer Science, Guelma University, BP 401, 24000 Guelma, Algeria 2Networks and Systems Laboratory, Badji Mokhtar… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Review
2016
Review
2016
Microarchitectural timing channels expose hidden hardware states though timing. We survey recent attacks that exploit… (More)
  • figure 1
  • table 1
  • table 2
  • table 2
  • table 3
Is this relevant?
Highly Cited
2013
Highly Cited
2013
The face recognition community has finally started paying more attention to the long-neglected problem of spoofing attacks. The… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU’s memory cache… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Cognitive radio is a revolutionary technology that promises to alleviate the spectrum shortage problem and to bring about… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Distributed Denial of Service (DDoS) attacks have become a large problem for users of computer systems connected to the Internet… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Many hardware countermeasures against differential power analysis (DPA) attacks have been developed during the last years… (More)
  • table 1
  • table 2
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Under a simple power leakage model based on Hamming weight, a software implementation of a data-whitening routine is shown to be… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1987
Highly Cited
1987
Fred Cohen received a B.S. in Electrical Engineering from Carnegie-Mellon University in 1977, an MS in Information Science from… (More)
  • figure 4
  • figure 5
  • figure 11
Is this relevant?