Friday seminar

16.08.2024
, 1:00 pm

Vendor malware: detection limits and mitigation

  • O. Lysne, K.J. HoleC.W. OtterstadØ. Ytrehus, R. Aarseth, and J. Tellnes, “Vendor malware: detection limits and mitigation” IEEE Computer, vol. 49, no. 8, 2016, p. 62–69
keyboard_arrow_up