Login / Signup
Protection against remote code execution exploits of popular applications in Windows.
Jeffrey Wu
Anthony Arrott
Fernando C. Colón Osorio
Published in:
MALWARE (2014)
Keyphrases
</>
code generation
windows nt
real time
source code
data flow
java virtual machine
control flow
windows xp
execution model
error correcting
tcp ip
application development
information systems
databases
data management
case study
remote access
e learning
neural network