Login / Signup
Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations.
Munawar Hafiz
Paul Adamczyk
Ralph E. Johnson
Published in:
ESSoS (2009)
Keyphrases
</>
database
data sources
missing data
injection attacks
data collection
knowledge discovery
computer systems
formal model
network security