Login / Signup

Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?

Hilmi Günes KayacikA. Nur Zincir-Heywood
Published in: PST (2008)
Keyphrases