Cyber-security protection techniques to mitigate memory errors exploitation | Publicación