https://dblp.org/rdf/schema#authoredBy
|
https://dblp.org/pid/70/9455 +
, https://dblp.org/pid/53/52 +
, https://dblp.org/pid/04/7805 +
, https://dblp.org/pid/140/0956 +
, https://dblp.org/pid/11/2335 +
, https://dblp.org/pid/48/296 +
, https://dblp.org/pid/90/4626 +
, https://dblp.org/pid/78/4433 +
|
https://dblp.org/rdf/schema#bibtexType
|
http://purl.org/net/nknouf/ns/bibtex#Inproceedings +
|
https://dblp.org/rdf/schema#documentPage
|
https://doi.org/10.1007/978-3-319-04891-8_19 +
|
https://dblp.org/rdf/schema#doi
|
https://doi.org/10.1007/978-3-319-04891-8_19 +
, http://dx.doi.org/10.1007/978-3-319-04891-8_19 +
|
https://dblp.org/rdf/schema#listedOnTocPage
|
https://dblp.org/db/conf/arcs/arcs2014 +
|
https://dblp.org/rdf/schema#numberOfCreators
|
8
|
https://dblp.org/rdf/schema#pagination
|
221-232
|
https://dblp.org/rdf/schema#primaryDocumentPage
|
https://doi.org/10.1007/978-3-319-04891-8_19 +
|
https://dblp.org/rdf/schema#publishedAsPartOf
|
https://dblp.org/rec/conf/arcs/2014 +
|
https://dblp.org/rdf/schema#publishedIn
|
ARCS
|
https://dblp.org/rdf/schema#publishedInBook
|
ARCS
|
https://dblp.org/rdf/schema#title
|
Detecting Compromised Programs for Embedded System Applications.
|
https://dblp.org/rdf/schema#wikidata
|
http://www.wikidata.org/entity/Q58487368 +
|
https://dblp.org/rdf/schema#yearOfEvent
|
2014
|
https://dblp.org/rdf/schema#yearOfPublication
|
2014
|
owl:sameAs |
https://doi.org/10.1007/978-3-319-04891-8_19 +
, http://dx.doi.org/10.1007/978-3-319-04891-8_19 +
, http://www.wikidata.org/entity/Q58487368 +
|
rdf:type |
https://dblp.org/rdf/schema#Publication +
, https://dblp.org/rdf/schema#Inproceedings +
|
rdfs:label |
Xiaojun Zhai et al.: Detecting Compromised Programs for Embedded System Applications. (2014)
|