Sign in

Game of detections: how are security vulnerabilities discovered in the wild?

Munawar HafizMing Fang
Published in: Empir. Softw. Eng. (2016)
Keyphrases
  • security vulnerabilities
  • intrusion detection
  • dos attacks
  • penetration testing
  • security properties
  • unauthorized access
  • database
  • data mining
  • artificial intelligence
  • sensor networks
  • data mining techniques