Login / Signup
A Novel Approach for Detecting Cyberattacks in Embedded Systems Based on Anomalous Patterns of Resource Utilization-Part I.
Abdulmohsan Aloseel
Saba Al-Rubaye
Argyrios C. Zolotas
Hongmei He
Carl Shaw
Published in:
IEEE Access (2021)
Keyphrases
</>
embedded systems
resource utilization
low cost
load balancing
resource management
quality of service
response time
high availability
network resources
software systems
flash memory
anomaly detection
virtual machine
fault tolerant
software engineering
grid computing
video streaming
digital libraries