Login / Signup

Security Vulnerabilities: From Analysis to Detection and Masking Techniques.

Shuo ChenJun XuZbigniew T. KalbarczykRavishankar K. Iyer
Published in: Proc. IEEE (2006)
Keyphrases
  • data analysis
  • security vulnerabilities
  • information sharing