•  English
    • Persian
    • English
  •   Login
  • Ferdowsi University of Mashhad
  • |
  • Information Center and Central Library
    • Persian
    • English
  • Home
  • Source Types
    • Journal Paper
    • Ebook
    • Conference Paper
    • Standard
    • Protocol
    • Thesis
  • Use Help
View Item 
  •   FUM Digital Library
  • Fum
  • Articles
  • Latin Articles
  • View Item
  •   FUM Digital Library
  • Fum
  • Articles
  • Latin Articles
  • View Item
  • All Fields
  • Title
  • Author
  • Year
  • Publisher
  • Subject
  • Publication Title
  • ISSN
  • DOI
  • ISBN
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Formalizing electrocardiogram (ECG) signal behavior in event-B

Author:
Al-Hamadi, Hussam
,
Gawanmeh, Amjad
,
Al-Qutayri, Mahmoud
Publisher:
IEEE
Year
: 2014
DOI: 10.1109/IISA.2014.6878840
URI: http://libsearch.um.ac.ir:80/fum/handle/fum/1077936
Keyword(s): security of data,n AMYNA,n MITRE ranking,n computer systems,n elevated security coverage,n high-level model,n memory-based attacks,n personalized optimum security solutions,n security generator framework,n zero-day attacks,n Computational modeling,n Computer architecture,n Libraries,n Load modeling,n Numerical models,n Real-time systems,n Security,n buffer overflow,n control-flow hijacking,n dynamic information flow tainting (DIFT),n ho
Collections :
  • Latin Articles
  • Show Full MetaData Hide Full MetaData
  • Statistics

    Formalizing electrocardiogram (ECG) signal behavior in event-B

Show full item record

contributor authorAl-Hamadi, Hussam
contributor authorGawanmeh, Amjad
contributor authorAl-Qutayri, Mahmoud
date accessioned2020-03-12T22:17:34Z
date available2020-03-12T22:17:34Z
date issued2014
identifier other7001813.pdf
identifier urihttp://libsearch.um.ac.ir:80/fum/handle/fum/1077936
formatgeneral
languageEnglish
publisherIEEE
titleFormalizing electrocardiogram (ECG) signal behavior in event-B
typeConference Paper
contenttypeMetadata Only
identifier padid8214205
subject keywordssecurity of data
subject keywordsn AMYNA
subject keywordsn MITRE ranking
subject keywordsn computer systems
subject keywordsn elevated security coverage
subject keywordsn high-level model
subject keywordsn memory-based attacks
subject keywordsn personalized optimum security solutions
subject keywordsn security generator framework
subject keywordsn zero-day attacks
subject keywordsn Computational modeling
subject keywordsn Computer architecture
subject keywordsn Libraries
subject keywordsn Load modeling
subject keywordsn Numerical models
subject keywordsn Real-time systems
subject keywordsn Security
subject keywordsn buffer overflow
subject keywordsn control-flow hijacking
subject keywordsn dynamic information flow tainting (DIFT)
subject keywordsn ho
identifier doi10.1109/IISA.2014.6878840
journal title-Health Networking, Applications and Services (Healthcom), 2014 IEEE 16th International Conference o
filesize507081
citations0
  • About Us
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
DSpace software copyright © 2019-2022  DuraSpace