共 50 条
- [21] Efficient Pattern Detection in Extremely Resource-Constrained Devices 2009 6TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD HOC COMMUNICATIONS AND NETWORKS (SECON 2009), 2009, : 10 - +
- [22] Runtime Classification of Mobile Malware for Resource-Constrained Devices E-BUSINESS AND TELECOMMUNICATIONS (ICETE 2016), 2017, 764 : 195 - 215
- [23] Resource-Constrained Neural Architecture Search on Edge Devices IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (01): : 134 - 142
- [25] Attacks on Resource-Constrained IoT Devices and Security Solutions INTERNATIONAL JOURNAL OF SOFTWARE SCIENCE AND COMPUTATIONAL INTELLIGENCE-IJSSCI, 2022, 14 (01):
- [26] A Distributed Security Mechanism for Resource-Constrained IoT Devices INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2016, 40 (01): : 133 - 143
- [28] Masked encryption algorithm mCrypton for resource-constrained devices IDAACS 2007: PROCEEDINGS OF THE 4TH IEEE WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2007, : 628 - +