Login / Signup
Predicting the Silent Data Corruption Vulnerability of Instructions in Programs.
Na Yang
Yun Wang
Published in:
ICPADS (2019)
Keyphrases
</>
data corruption
buffer overflow
computer programs
database
wireless sensor networks