Login / Signup
Benchmark Tool for Detecting Anomalous Program Behaviour on Embedded Devices.
Michal Borowski
Sangeet Saha
Xiaojun Zhai
Klaus D. McDonald-Maier
Published in:
TrustCom (2022)
Keyphrases
</>
embedded devices
detecting anomalous
intrusion detection
embedded systems
anomaly detection
network traffic
mobile devices
limited memory
data mining
data storage
data structure
data streams
training set
semi supervised
resource constrained