Cited By
View all- Cammarota RSheikh RKaeli DPericàs M(2018)VPsecProceedings of the 15th ACM International Conference on Computing Frontiers10.1145/3203217.3203276(191-199)Online publication date: 8-May-2018
- Moreira FDiener MNavaux PKoren IGiorgi RBecchi MPalumbo F(2017)Data mining the memory access stream to detect anomalous application behaviorProceedings of the Computing Frontiers Conference10.1145/3075564.3075578(45-52)Online publication date: 15-May-2017
- Li TAmbrose JRagel RParameswaran S(2016)Processor Design for Soft ErrorsACM Computing Surveys10.1145/299635749:3(1-44)Online publication date: 8-Nov-2016
- Show More Cited By