Login / Signup

Rule-Based Source Level Patching of Buffer Overflow Vulnerabilities.

Hossain ShahriarHisham M. Haddad
Published in: ITNG (2013)
Keyphrases
  • buffer overflow
  • data corruption
  • security problems
  • rare events
  • information systems
  • decision trees