Text this: Hierarchical framework for runtime intrusion detection in embedded systems

  ______     ___                 ___     _    _   
 /_____//   / _ \\      ___     / _ \\  | |  | || 
 `____ `   / //\ \\    /   ||  / //\ \\ | |/\| || 
 /___//   |  ___  ||  | [] || |  ___  |||  /\  || 
 `__ `    |_||  |_||   \__ || |_||  |_|||_// \_|| 
 /_//     `-`   `-`     -|_|| `-`   `-` `-`   `-` 
 `-`                     `-`