Login / Signup
System Configuration Contributions to Vulnerability: Applications to Connected Personal Devices.
Lindsay Robertson
Albert Munoz Aneiros
Published in:
IEEE Technol. Soc. Mag. (2017)
Keyphrases
</>
mobile devices
personal information
embedded devices
databases
data sets
neural network
mobile applications
handheld devices
database
artificial intelligence
search engine
image sequences
connected components
risk assessment
personal digital assistants
personal web