Formalizing electrocardiogram (ECG) signal behavior in event-B
ناشر:
سال
: 2014شناسه الکترونیک: 10.1109/IISA.2014.6878840
کلیدواژه(گان): security of data,n AMYNA,n MITRE ranking,n computer systems,n elevated security coverage,n high-level model,n memory-based attacks,n personalized optimum security solutions,n security generator framework,n zero-day attacks,n Computational modeling,n Computer architecture,n Libraries,n Load modeling,n Numerical models,n Real-time systems,n Security,n buffer overflow,n control-flow hijacking,n dynamic information flow tainting (DIFT),n ho
کالکشن
:
-
آمار بازدید
Formalizing electrocardiogram (ECG) signal behavior in event-B
Show full item record
contributor author | Al-Hamadi, Hussam | |
contributor author | Gawanmeh, Amjad | |
contributor author | Al-Qutayri, Mahmoud | |
date accessioned | 2020-03-12T22:17:34Z | |
date available | 2020-03-12T22:17:34Z | |
date issued | 2014 | |
identifier other | 7001813.pdf | |
identifier uri | http://libsearch.um.ac.ir:80/fum/handle/fum/1077936 | |
format | general | |
language | English | |
publisher | IEEE | |
title | Formalizing electrocardiogram (ECG) signal behavior in event-B | |
type | Conference Paper | |
contenttype | Metadata Only | |
identifier padid | 8214205 | |
subject keywords | security of data | |
subject keywords | n AMYNA | |
subject keywords | n MITRE ranking | |
subject keywords | n computer systems | |
subject keywords | n elevated security coverage | |
subject keywords | n high-level model | |
subject keywords | n memory-based attacks | |
subject keywords | n personalized optimum security solutions | |
subject keywords | n security generator framework | |
subject keywords | n zero-day attacks | |
subject keywords | n Computational modeling | |
subject keywords | n Computer architecture | |
subject keywords | n Libraries | |
subject keywords | n Load modeling | |
subject keywords | n Numerical models | |
subject keywords | n Real-time systems | |
subject keywords | n Security | |
subject keywords | n buffer overflow | |
subject keywords | n control-flow hijacking | |
subject keywords | n dynamic information flow tainting (DIFT) | |
subject keywords | n ho | |
identifier doi | 10.1109/IISA.2014.6878840 | |
journal title | -Health Networking, Applications and Services (Healthcom), 2014 IEEE 16th International Conference o | |
filesize | 507081 | |
citations | 0 |