![]() |
Volumn , Issue , 2010, Pages 2211-2216
|
Detecting unauthorized software execution in SDR using power fingerprinting
|
Author keywords
[No Author keywords available]
|
Indexed keywords
CODE EXECUTION;
COMMUNICATIONS INFRASTRUCTURE;
DYNAMIC POWER CONSUMPTION;
EFFECTIVE SOLUTION;
EXECUTION INTEGRITY;
FEASIBILITY EXPERIMENTS;
INTEGRITY ASSESSMENT;
MAINTENANCE TIME;
MALICIOUS SOFTWARE;
RADIO PLATFORMS;
SENSITIVE INFORMATIONS;
SOFTWARE EXECUTION;
SOFTWARE UPDATES;
SOFTWARE-DEFINED RADIOS;
TEST CODE;
COMPUTER SOFTWARE MAINTENANCE;
CRITICAL INFRASTRUCTURES;
PATTERN RECOGNITION;
MILITARY COMMUNICATIONS;
|
EID: 79951663245
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/MILCOM.2010.5680393 Document Type: Conference Paper |
Times cited : (10)
|
References (9)
|