Login / Signup
Security Vulnerabilities: From Analysis to Detection and Masking Techniques.
Shuo Chen
Jun Xu
Zbigniew T. Kalbarczyk
Ravishankar K. Iyer
Published in:
Proc. IEEE (2006)
Keyphrases
</>
data analysis
security vulnerabilities
information sharing