| contributor author | Al-Hamadi, Hussam | |
| contributor author | Gawanmeh, Amjad | |
| contributor author | Al-Qutayri, Mahmoud | |
| date accessioned | 2020-03-12T22:17:34Z | |
| date available | 2020-03-12T22:17:34Z | |
| date issued | 2014 | |
| identifier other | 7001813.pdf | |
| identifier uri | https://libsearch.um.ac.ir:443/fum/handle/fum/1077936?show=full | |
| format | general | |
| language | English | |
| publisher | IEEE | |
| title | Formalizing electrocardiogram (ECG) signal behavior in event-B | |
| type | Conference Paper | |
| contenttype | Metadata Only | |
| identifier padid | 8214205 | |
| subject keywords | security of data | |
| subject keywords | n AMYNA | |
| subject keywords | n MITRE ranking | |
| subject keywords | n computer systems | |
| subject keywords | n elevated security coverage | |
| subject keywords | n high-level model | |
| subject keywords | n memory-based attacks | |
| subject keywords | n personalized optimum security solutions | |
| subject keywords | n security generator framework | |
| subject keywords | n zero-day attacks | |
| subject keywords | n Computational modeling | |
| subject keywords | n Computer architecture | |
| subject keywords | n Libraries | |
| subject keywords | n Load modeling | |
| subject keywords | n Numerical models | |
| subject keywords | n Real-time systems | |
| subject keywords | n Security | |
| subject keywords | n buffer overflow | |
| subject keywords | n control-flow hijacking | |
| subject keywords | n dynamic information flow tainting (DIFT) | |
| subject keywords | n ho | |
| identifier doi | 10.1109/IISA.2014.6878840 | |
| journal title | -Health Networking, Applications and Services (Healthcom), 2014 IEEE 16th International Conference o | |
| filesize | 507081 | |
| citations | 0 | |