Bitmap-Based Security Monitoring for Deeply Embedded Systems. Peng, A., Fang, D., Guan, L., Van Der Kouwe, E., Li, Y., Wang, W., Sun, L., & Zhang, Y. ACM Transactions on Software Engineering and Methodology, 33(7):1–31, September, 2024.
Paper doi bibtex 36 downloads @article{peng_bitmap-based_2024,
title = {Bitmap-{Based} {Security} {Monitoring} for {Deeply} {Embedded} {Systems}},
volume = {33},
url = {Paper=https://dl.acm.org/doi/pdf/10.1145/3672460},
doi = {https://doi.org/10.1145/3672460},
number = {7},
journal = {ACM Transactions on Software Engineering and Methodology},
author = {Peng, Anni and Fang, Dongliang and Guan, Le and Van Der Kouwe, Erik and Li, Yin and Wang, Wenwen and Sun, Limin and Zhang, Yuqing},
month = sep,
year = {2024},
keywords = {type\_journal, type\_paper, type\_top},
pages = {1--31},
}
Downloads: 36
{"_id":"ob7fricmmn26jF72E","bibbaseid":"peng-fang-guan-vanderkouwe-li-wang-sun-zhang-bitmapbasedsecuritymonitoringfordeeplyembeddedsystems-2024","author_short":["Peng, A.","Fang, D.","Guan, L.","Van Der Kouwe, E.","Li, Y.","Wang, W.","Sun, L.","Zhang, Y."],"bibdata":{"bibtype":"article","type":"article","title":"Bitmap-Based Security Monitoring for Deeply Embedded Systems","volume":"33","doi":"https://doi.org/10.1145/3672460","number":"7","journal":"ACM Transactions on Software Engineering and Methodology","author":[{"propositions":[],"lastnames":["Peng"],"firstnames":["Anni"],"suffixes":[]},{"propositions":[],"lastnames":["Fang"],"firstnames":["Dongliang"],"suffixes":[]},{"propositions":[],"lastnames":["Guan"],"firstnames":["Le"],"suffixes":[]},{"propositions":[],"lastnames":["Van","Der","Kouwe"],"firstnames":["Erik"],"suffixes":[]},{"propositions":[],"lastnames":["Li"],"firstnames":["Yin"],"suffixes":[]},{"propositions":[],"lastnames":["Wang"],"firstnames":["Wenwen"],"suffixes":[]},{"propositions":[],"lastnames":["Sun"],"firstnames":["Limin"],"suffixes":[]},{"propositions":[],"lastnames":["Zhang"],"firstnames":["Yuqing"],"suffixes":[]}],"month":"September","year":"2024","keywords":"type_journal, type_paper, type_top","pages":"1–31","bibtex":"@article{peng_bitmap-based_2024,\n\ttitle = {Bitmap-{Based} {Security} {Monitoring} for {Deeply} {Embedded} {Systems}},\n\tvolume = {33},\n\turl = {Paper=https://dl.acm.org/doi/pdf/10.1145/3672460},\n\tdoi = {https://doi.org/10.1145/3672460},\n\tnumber = {7},\n\tjournal = {ACM Transactions on Software Engineering and Methodology},\n\tauthor = {Peng, Anni and Fang, Dongliang and Guan, Le and Van Der Kouwe, Erik and Li, Yin and Wang, Wenwen and Sun, Limin and Zhang, Yuqing},\n\tmonth = sep,\n\tyear = {2024},\n\tkeywords = {type\\_journal, type\\_paper, type\\_top},\n\tpages = {1--31},\n}\n\n","author_short":["Peng, A.","Fang, D.","Guan, L.","Van Der Kouwe, E.","Li, Y.","Wang, W.","Sun, L.","Zhang, Y."],"urlPaper":"https://dl.acm.org/doi/pdf/10.1145/3672460","key":"peng_bitmap-based_2024","id":"peng_bitmap-based_2024","bibbaseid":"peng-fang-guan-vanderkouwe-li-wang-sun-zhang-bitmapbasedsecuritymonitoringfordeeplyembeddedsystems-2024","role":"author","urls":{"Paper":"https://dl.acm.org/doi/pdf/10.1145/3672460"},"keyword":["type_journal","type_paper","type_top"],"metadata":{"authorlinks":{}},"downloads":36},"bibtype":"article","biburl":"https://download.vusec.net/papers/zotero.php?tag=&full=1&format=bibtex&sort=date","dataSources":["JLGtnQqjNvhKfC2ff","LY5xkJFgS2sBQ9umB","JWcaY4xDbjG3msjWc"],"keywords":["type_journal","type_paper","type_top"],"search_terms":["bitmap","based","security","monitoring","deeply","embedded","systems","peng","fang","guan","van der kouwe","li","wang","sun","zhang"],"title":"Bitmap-Based Security Monitoring for Deeply Embedded Systems","year":2024,"downloads":36}