04.11.2024
– 04.11.2024
, 1:00 pm
Vendor malware: detection limits and mitigation
- O. Lysne, K.J. Hole, C.W. Otterstad, Ø. Ytrehus, R. Aarseth, and J. Tellnes, “Vendor malware: detection limits and mitigation” IEEE Computer, vol. 49, no. 8, 2016, p. 62–69
keyboard_arrow_up