Login / Signup

Towards Automatic Generation of Vulnerability-Based Signatures.

David BrumleyJames NewsomeDawn Xiaodong SongHao WangSomesh Jha
Published in: IEEE Symposium on Security and Privacy (2006)
Keyphrases
  • automatically generate
  • signature verification
  • risk assessment
  • signature recognition
  • website
  • information systems
  • multiscale
  • data structure
  • hidden markov models
  • automatically generating