Login / Signup
Semantic aware attribution analysis of remote exploits.
Deguang Kong
Donghai Tian
Qiha Pan
Peng Liu
Dinghao Wu
Published in:
Secur. Commun. Networks (2013)
Keyphrases
</>
image analysis
statistical analysis
quantitative analysis
automatic analysis
real time
real world
multi agent systems
computational complexity
lower bound