Login / Signup

A Methodology to Assess Output Vulnerability Factors for Detecting Silent Data Corruption.

Junchi MaZongtao DuanLei Tang
Published in: IEEE Access (2019)
Keyphrases
  • data corruption
  • buffer overflow