[1]
S. Kostiuchko and O. Olshevskyi, “Overview of hardware vulnerabilities of embedded systems on the example of Rowhammer. ”, cit, no. 44, pp. 106-110, Oct. 2021.