Login / Signup
Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures.
David Brumley
James Newsome
Dawn Song
Hao Wang
Somesh Jha
Published in:
IEEE Trans. Dependable Secur. Comput. (2008)
Keyphrases
</>
theoretical framework
databases
neural network
three dimensional
automatically generate
general theory
data sets
knowledge base
conceptual framework
decision theory
signature verification