Login / Signup
Software security: Vulnerabilities and countermeasures for two attacker models.
Frank Piessens
Ingrid Verbauwhede
Published in:
DATE (2016)
Keyphrases
</>
countermeasures
security vulnerabilities
sql injection
information security
software development
attack graphs
databases
source code
intrusion detection
cyber attacks
power analysis