Login / Signup

Study on Diffusion of Protection/Mitigation against Memory Corruption Attack in Linux Distributions.

Takamichi SaitoHiroyuki MiyazakiTakaaki BabaYoshifumi SumidaYosuke Hori
Published in: IMIS (2015)
Keyphrases
  • memory requirements
  • data corruption
  • neural network
  • data mining
  • multiscale
  • data structure
  • learning environment
  • open source