Login / Signup
Malicious takeover of voting systems: arbitrary code execution on optical scan voting terminals.
Russell J. Jancewicz
Aggelos Kiayias
Laurent D. Michel
Alexander Russell
Alexander A. Shvartsman
Published in:
SAC (2013)
Keyphrases
</>
voting method
intelligent systems
expert systems
complex systems
malicious code
source code
distributed systems
weighted voting
information systems
case study
control flow
majority voting
voting scheme
legacy systems