Login / Signup
ISaFe - Injecting Security Features into Constrained Embedded Firmware.
Matthias Wenzl
Georg Merzdovnik
Edgar R. Weippl
Published in:
ERCIM News (2019)
Keyphrases
</>
low level
computer security
neural network
feature extraction
intrusion detection
information systems
face recognition
classification accuracy
low cost
false positives
information security
embedded systems
network security