Back to Results
First PageMeta Content
Computing / Software testing / Hacking / Vulnerability / Buffer overflow / Intrusion prevention system / Social vulnerability / Zero-day attack / Exploit / Cyberwarfare / Computer security / Computer network security


224 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 5,
Add to Reading List

Document Date: 2014-05-29 15:38:01


Open Document

File Size: 1,83 MB

Share Result on Facebook
UPDATE