Sign in

Responding to Targeted Stealthy Attacks on Android Using Timely-Captured Memory Dumps.

Jennifer BellizziMark VellaChristian ColomboJulio César Hernández Castro
Published in: IEEE Access (2022)
Keyphrases
  • security protocols
  • memory requirements
  • mobile devices
  • computing power
  • memory usage
  • information systems
  • computational power
  • memory size
  • data mining
  • main memory
  • associative memory
  • memory management