Articles with "vulnerability applications" as a keyword



Photo by averey from unsplash

System Configuration Contributions to Vulnerability: Applications to Connected Personal Devices

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Technology and Society Magazine"

DOI: 10.1109/mts.2017.2654289

Abstract: There is a strong impetus to commercialize emerging technology, tempered by safety expectations and regulatory compliance requirements [1]. Such is the case for medical implant devices, where successful operation of devices can be life-saving, but… read more here.

Keywords: configuration; vulnerability; system configuration; configuration contributions ... See more keywords