Login / Signup
Detecting Compromised Programs for Embedded System Applications.
Xiaojun Zhai
Kofi Appiah
Shoaib Ehsan
Wah M. Cheung
Gareth Howells
Huosheng Hu
Dongbing Gu
Klaus D. McDonald-Maier
Published in:
ARCS (2014)
Keyphrases
</>
automatic programming
website
automatic detection
real time
data sets
databases
neural network
data mining
image processing
three dimensional
preprocessing
answer sets
stable models
prolog programs