Login / Signup
Vulnerability Bazaar.
David McKinney
Published in:
IEEE Secur. Priv. (2007)
Keyphrases
</>
risk assessment
artificial neural networks
computer vision
database
databases
data mining
information systems
preprocessing
information technology
buffer overflow