Login / Signup
Exploiting military OpSec through open-source vulnerabilities.
Judson C. Dressler
Christopher Bronk
Daniel S. Wallach
Published in:
MILCOM (2015)
Keyphrases
</>
open source
open source software
source code
case study
social networks
path planning
security vulnerabilities
artificial intelligence
high level
countermeasures
security issues
open source projects
core components