Login / Signup
Acquisition and analysis of compromised firmware using memory forensics.
Johannes Stüttgen
Stefan Vömel
Michael Denzel
Published in:
Digit. Investig. (2015)
Keyphrases
</>
statistical analysis
data analysis
data sets
real world
memory usage
memory requirements
computer systems
memory size
real time
quantitative analysis
operating system
computational complexity
case study
knowledge base
e learning
artificial intelligence
databases