Login / Signup
Finding diversity in remote code injection exploits.
Justin Ma
John Dunagan
Helen J. Wang
Stefan Savage
Geoffrey M. Voelker
Published in:
Internet Measurement Conference (2006)
Keyphrases
</>
real time
real world
machine learning
artificial intelligence
information systems
source code
method finds
data sets
neural network
mobile devices
java programs