Publication

Verification of an EMI-compliant monitor and its vulnerabilities from a data security point of view