Login / Signup
A Component Vulnerability Matching Approach for IoT Firmware.
Bo Yu
Yongyi Zhang
Runhao Liu
Zhoushi Sheng
Published in:
APNet (2022)
Keyphrases
</>
matching algorithm
management system
image matching
operating system
pattern matching
web services
power consumption
matching process
affine invariant
real time
neural network
case study
image features
computer systems
cloud computing
shape matching