Research
Intro
Focus areas
Projects
Publications
Education
Culture
Events
People
Vendor malware: detection limits and mitigation
O. Lysne,
K.J. Hole
,
C.W. Otterstad
,
Ø. Ytrehus
, R. Aarseth, and J. Tellnes, “Vendor malware: detection limits and mitigation”
IEEE Computer
, vol. 49, no. 8, 2016, p. 62–69
keyboard_arrow_up
Menu