Providing security on demand using invasive computing.
Gabor DrescherChristoph ErhardtFelix C. FreilingJohannes GötzfriedDaniel LohmannPieter MaeneTilo MüllerIngrid VerbauwhedeAndreas WeichslgartnerStefan WildermannPublished in: it Inf. Technol. (2016)