Login / Signup

A model for detecting the existence of software corruption in real time.

Jeffrey M. VoasJeffery E. PayneFrederick B. Cohen
Published in: Comput. Secur. (1993)
Keyphrases