PhD defence: Nicolas Costes
Trial Lecture: Coding for Flash Memories: State-of-the-art and Challenges
Vendor malware: detection limits and mitigation
- O. Lysne, K.J. Hole, C.W. Otterstad, Ø. Ytrehus, R. Aarseth, and J. Tellnes, “Vendor malware: detection limits and mitigation” IEEE Computer, vol. 49, no. 8, 2016, p. 62–69
keyboard_arrow_up