Login / Signup
Towards Automatic Generation of Vulnerability-Based Signatures.
David Brumley
James Newsome
Dawn Xiaodong Song
Hao Wang
Somesh Jha
Published in:
IEEE Symposium on Security and Privacy (2006)
Keyphrases
</>
automatically generate
signature verification
risk assessment
signature recognition
website
information systems
multiscale
data structure
hidden markov models
automatically generating