Login / Signup

Detecting Compromised Programs for Embedded System Applications.

Xiaojun ZhaiKofi AppiahShoaib EhsanWah M. CheungGareth HowellsHuosheng HuDongbing GuKlaus D. McDonald-Maier
Published in: ARCS (2014)
Keyphrases
  • automatic programming
  • website
  • automatic detection
  • real time
  • data sets
  • databases
  • neural network
  • data mining
  • image processing
  • three dimensional
  • preprocessing
  • answer sets
  • stable models
  • prolog programs