Formalizing electrocardiogram (ECG) signal behavior in event-B
Publisher:
Year
: 2014DOI: 10.1109/IISA.2014.6878840
Keyword(s): security of data,n AMYNA,n MITRE ranking,n computer systems,n elevated security coverage,n high-level model,n memory-based attacks,n personalized optimum security solutions,n security generator framework,n zero-day attacks,n Computational modeling,n Computer architecture,n Libraries,n Load modeling,n Numerical models,n Real-time systems,n Security,n buffer overflow,n control-flow hijacking,n dynamic information flow tainting (DIFT),n ho
Collections
:
-
Statistics
Formalizing electrocardiogram (ECG) signal behavior in event-B
Show full item record
| contributor author | Al-Hamadi, Hussam | |
| contributor author | Gawanmeh, Amjad | |
| contributor author | Al-Qutayri, Mahmoud | |
| date accessioned | 2020-03-12T22:17:34Z | |
| date available | 2020-03-12T22:17:34Z | |
| date issued | 2014 | |
| identifier other | 7001813.pdf | |
| identifier uri | https://libsearch.um.ac.ir:443/fum/handle/fum/1077936?locale-attribute=en | |
| format | general | |
| language | English | |
| publisher | IEEE | |
| title | Formalizing electrocardiogram (ECG) signal behavior in event-B | |
| type | Conference Paper | |
| contenttype | Metadata Only | |
| identifier padid | 8214205 | |
| subject keywords | security of data | |
| subject keywords | n AMYNA | |
| subject keywords | n MITRE ranking | |
| subject keywords | n computer systems | |
| subject keywords | n elevated security coverage | |
| subject keywords | n high-level model | |
| subject keywords | n memory-based attacks | |
| subject keywords | n personalized optimum security solutions | |
| subject keywords | n security generator framework | |
| subject keywords | n zero-day attacks | |
| subject keywords | n Computational modeling | |
| subject keywords | n Computer architecture | |
| subject keywords | n Libraries | |
| subject keywords | n Load modeling | |
| subject keywords | n Numerical models | |
| subject keywords | n Real-time systems | |
| subject keywords | n Security | |
| subject keywords | n buffer overflow | |
| subject keywords | n control-flow hijacking | |
| subject keywords | n dynamic information flow tainting (DIFT) | |
| subject keywords | n ho | |
| identifier doi | 10.1109/IISA.2014.6878840 | |
| journal title | -Health Networking, Applications and Services (Healthcom), 2014 IEEE 16th International Conference o | |
| filesize | 507081 | |
| citations | 0 |


