Login / Signup
Responding to Targeted Stealthy Attacks on Android Using Timely-Captured Memory Dumps.
Jennifer Bellizzi
Mark Vella
Christian Colombo
Julio César Hernández Castro
Published in:
IEEE Access (2022)
Keyphrases
</>
security protocols
memory requirements
mobile devices
computing power
memory usage
information systems
computational power
memory size
data mining
main memory
associative memory
memory management