Login / Signup

Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures.

David BrumleyJames NewsomeDawn SongHao WangSomesh Jha
Published in: IEEE Trans. Dependable Secur. Comput. (2008)
Keyphrases
  • theoretical framework
  • databases
  • neural network
  • three dimensional
  • automatically generate
  • general theory
  • data sets
  • knowledge base
  • conceptual framework
  • decision theory
  • signature verification