Sign in

Replacement attacks: automatically evading behavior-based software birthmark.

Zhi XinHuiyu ChenXinche WangPeng LiuSencun ZhuBing MaoLi Xie
Published in: Int. J. Inf. Sec. (2012)
Keyphrases