1.
Kostiuchko S, Olshevskyi O. Overview of hardware vulnerabilities of embedded systems on the example of Rowhammer. . cit [Internet]. 2021Oct.30 [cited 2025Apr.12];(44):106-10. Available from: https://cit.lntu.edu.ua/index.php/cit/article/view/305