Search
Now showing items 1-3 of 3
Host-based code injection attacks: A popular technique used by malware
Publisher: IEEE
Year: 2014
Research of a transformer fault diagnose method using multi-source recording waves
Publisher: IEEE
Year: 2014
Cooperative control of multi-UAV with time constraint in the threat environment
Publisher: IEEE
Year: 2014