Exploitation Techniques for Data-Oriented Attacks with Existing and Potential Defense Approaches. Cheng, L., Ahmed, S., Liljestrand, H., Nyman, T., Cai, H., Jaeger, T., Asokan, N., & Yao, D. ACM Transactions on Privacy and Security (TOPS), 24(4):1–36, 2021. (impact factor: 1.974)
Exploitation Techniques for Data-Oriented Attacks with Existing and Potential Defense Approaches [pdf]Pdf  doi  bibtex   14 downloads  

Downloads: 14