Back to Results
First PageMeta Content
Computer network security / Hacking / Security / Attack patterns / Vulnerability / Application security / Penetration test / Buffer overflow / Port scanner / Computer security / Cyberwarfare / Software testing


Matching Attack Signatures to Security Vulnerabilities in Software-Intensive System Designs
Add to Reading List

Document Date: 2013-04-11 05:18:10


Open Document

File Size: 152,95 KB

Share Result on Facebook
UPDATE