Login / Signup
Practical taint-based protection using demand emulation.
Alex Ho
Michael A. Fetterman
Christopher Clark
Andrew Warfield
Steven Hand
Published in:
EuroSys (2006)
Keyphrases
</>
real world
artificial intelligence
decision making
databases
neural network
data mining
search engine
security policies
privacy protection
control flow