Login / Signup
How Inadequate Specification, Buggy Implementation, and Deficient Platform-Support Hinder Security.
Omar Chowdhury
Published in:
SACMAT (2018)
Keyphrases
</>
core components
primary purpose
end users
intrusion detection
information security
computing environments
security policies
specification language
service management
access control
collaborative environment
platform independent
agent platform
runtime environment