Abstract: This paper explores the use of control-flow information for detecting IoT malware across three different platforms. We propose a pipeline which extracts Control-Flow Graphs (CFGs) from ...
Abstract: With the increase of the penetration of distributed generator (DG) in microgrid (MG), traditional power flow calculation and optimization methods are no longer applicable. Based on the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results