Login / Signup
Analysing Requirements to Detect Latent Security Vulnerabilities.
Curtis C. R. Busby Earle
Robert B. France
Indrakshi Ray
Published in:
SERE (Companion) (2014)
Keyphrases
</>
security vulnerabilities
intrusion detection
dos attacks
penetration testing
database
intrusion detection system
network security