Login / Signup

Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations.

Munawar HafizPaul AdamczykRalph E. Johnson
Published in: ESSoS (2009)
Keyphrases
  • database
  • data sources
  • missing data
  • injection attacks
  • data collection
  • knowledge discovery
  • computer systems
  • formal model
  • network security