Sign in
Game of detections: how are security vulnerabilities discovered in the wild?
Munawar Hafiz
Ming Fang
Published in:
Empir. Softw. Eng. (2016)
Keyphrases
</>
security vulnerabilities
intrusion detection
dos attacks
penetration testing
security properties
unauthorized access
database
data mining
artificial intelligence
sensor networks
data mining techniques