h1

h2

h3

h4

h5
h6
000994241 001__ 994241
000994241 005__ 20250207112630.0
000994241 0247_ $$2ISBN$$a979-8-4007-0555-7
000994241 0247_ $$2SCOPUS$$aSCOPUS:2-s2.0-85197296448
000994241 0247_ $$2WOS$$aWOS:001294597900002
000994241 0247_ $$2datacite_doi$$a10.18154/RWTH-2024-09185
000994241 0247_ $$2doi$$a10.1145/3643650.3658606
000994241 037__ $$aRWTH-2024-09185
000994241 041__ $$aEnglish
000994241 1001_ $$0P:(DE-82)IDM04915$$aStaudigl, Felix$$b0$$urwth
000994241 1112_ $$aACM Workshop on Secure and Trustworthy Cyber-Physical Systems$$cPorto$$d2024-06-21 - 2024-06-21$$gSaT-CPS 2024$$wPortugal
000994241 245__ $$aNVM-Flip: Non-Volatile-Memory BitFlips on the System Level$$honline
000994241 260__ $$a[Erscheinungsort nicht ermittelbar]$$bAssociation for Computing Machinery$$c2024
000994241 29510 $$aProceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems
000994241 300__ $$a11-20
000994241 3367_ $$033$$2EndNote$$aConference Paper
000994241 3367_ $$0PUB:(DE-HGF)7$$2PUB:(DE-HGF)$$aContribution to a book$$mcontb
000994241 3367_ $$0PUB:(DE-HGF)8$$2PUB:(DE-HGF)$$aContribution to a conference proceedings$$bcontrib$$mcontrib
000994241 3367_ $$2BibTeX$$aINPROCEEDINGS
000994241 3367_ $$2DRIVER$$aconferenceObject
000994241 3367_ $$2DataCite$$aOutput Types/Conference Paper
000994241 3367_ $$2ORCID$$aCONFERENCE_PAPER
000994241 588__ $$aDataset connected to , , , CrossRef Conference
000994241 591__ $$aGermany
000994241 7001_ $$00000-0003-1613-732X$$aThoma, Jan Philipp$$b1
000994241 7001_ $$00000-0002-8589-5231$$aNiesler, Christian$$b2
000994241 7001_ $$0P:(DE-82)847676$$aSturm, Karl$$b3$$urwth
000994241 7001_ $$0P:(DE-82)IDM06208$$aPelke, Rebecca$$b4$$urwth
000994241 7001_ $$00000-0003-3812-727X$$aGermek, Dominik$$b5
000994241 7001_ $$0P:(DE-82)IDM05276$$aJoseph, Jan Moritz$$b6$$urwth
000994241 7001_ $$00000-0002-3293-4989$$aGüneysu, Tim$$b7
000994241 7001_ $$00000-0002-7322-2777$$aDavi, Lucas$$b8
000994241 7001_ $$0P:(DE-82)IDM00503$$aLeupers, Rainer$$b9$$urwth
000994241 7112_ $$a14. ACM Conference on Data and Application Security and Privacy$$cPorto$$d2024-06-19 - 2024-06-21$$gCODASPY 2024$$wPortugal
000994241 8564_ $$uhttps://publications.rwth-aachen.de/record/994241/files/994241.pdf$$yOpenAccess
000994241 909CO $$ooai:publications.rwth-aachen.de:994241$$pVDB$$pdnbdelivery$$pdriver$$popen_access$$popenaire
000994241 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM04915$$aRWTH Aachen$$b0$$kRWTH
000994241 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)847676$$aRWTH Aachen$$b3$$kRWTH
000994241 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM06208$$aRWTH Aachen$$b4$$kRWTH
000994241 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM05276$$aRWTH Aachen$$b6$$kRWTH
000994241 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM00503$$aRWTH Aachen$$b9$$kRWTH
000994241 9141_ $$y2024
000994241 9151_ $$0StatID:(DE-HGF)0031$$2StatID$$aPeer reviewed article$$x0
000994241 915__ $$0LIC:(DE-HGF)CCBYNC4$$2HGFVOC$$aCreative Commons Attribution-NonCommercial CC BY-NC 4.0
000994241 915__ $$0StatID:(DE-HGF)0510$$2StatID$$aOpenAccess
000994241 9201_ $$0I:(DE-82)611910_20140620$$k611910$$lLehrstuhl für Software für Systeme auf Silizium$$x0
000994241 9201_ $$0I:(DE-82)080017_20140620$$k080017$$lProfilbereich Information & Communication Technology (ICT)$$x1
000994241 961__ $$c2024-10-01T09:01:51.367925$$x2024-10-01T09:01:51.367925$$z2024-10-01T09:01:51.367925
000994241 9801_ $$aFullTexts
000994241 980__ $$aI:(DE-82)080017_20140620
000994241 980__ $$aI:(DE-82)611910_20140620
000994241 980__ $$aUNRESTRICTED
000994241 980__ $$aVDB
000994241 980__ $$acontb
000994241 980__ $$acontrib