Login / Signup
Code-Tampering Defense for Internet of Things Using System Call Traces.
Rajesh Kumar Shrivastava
Chittaranjan Hota
Published in:
I4CS (2020)
Keyphrases
</>
digital images
reverse engineering
source code
mobile devices
key technologies
forensic analysis
network security
physical world
ubiquitous computing
advanced research projects agency
execution traces
authentication scheme
big data
multimedia
computer networks
software engineering
supply chain
computer virus