Back to Results
First PageMeta Content
Computer security / Cyberwarfare / Computing / Computer network security / Software testing / Vulnerability / Hacking / Zero-day / Buffer overflow / Metasploit Project / Code injection / Social vulnerability


224 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 5,
Add to Reading List

Document Date: 2014-05-29 15:38:01


Open Document

File Size: 1,83 MB

Share Result on Facebook