Login / Signup
Experiments with Deceptive Software Responses to Buffer-Based Attacks.
Donald P. Julian
Neil C. Rowe
James Bret Michael
Published in:
IAW (2003)
Keyphrases
</>
software tools
software systems
user interface
source code
computer systems
software architecture
embedded systems
neural network
software maintenance
software package
traffic analysis
security risks
malicious attacks
email
development process
mental states
buffer size
security vulnerabilities