Login / Signup
A Methodology to Assess Output Vulnerability Factors for Detecting Silent Data Corruption.
Junchi Ma
Zongtao Duan
Lei Tang
Published in:
IEEE Access (2019)
Keyphrases
</>
data corruption
buffer overflow