Text this: Hierarchical framework for runtime intrusion detection in embedded systems

 _    _      ___       _____    _____      _____  
| |  | ||   / _ \\    / ___//  |  ___||   / ___// 
| |/\| ||  / //\ \\   \___ \\  | ||__     \___ \\ 
|  /\  || |  ___  ||  /    //  | ||__     /    // 
|_// \_|| |_||  |_|| /____//   |_____||  /____//  
`-`   `-` `-`   `-` `-----`    `-----`  `-----`