Sign in
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks.
Yves Younan
Wouter Joosen
Frank Piessens
Published in:
IWIA (2005)
Keyphrases
</>
countermeasures
sql injection
injection attacks
information security
power analysis
security measures
source code
database
java card