3   Artículos

 
en línea
Enze Wang, Baosheng Wang, Wei Xie, Zhenhua Wang, Zhenhao Luo and Tai Yue    
At present, embedded devices have become a part of people?s lives, so detecting security vulnerabilities contained in devices becomes imperative. There are three challenges in detecting embedded device vulnerabilities: (1) Most network protocols are stat... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Blerim Rexha, Gresa Shala and Valon Xhafa    
Personal mobile devices currently have access to a significant portion of their user?s private sensitive data and are increasingly used for processing mobile payments. Consequently, securing access to these mobile devices is a requirement for securing ac... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »