Login / Signup

Dependency criteria on regulated inputs for buffer overflow approximation.

András GulyásJózsef BíróZalán HeszbergerTamás Szénási
Published in: ICC (2005)
Keyphrases
  • buffer overflow
  • data corruption
  • security problems
  • database systems
  • active learning
  • software architecture
  • protection scheme