Sign in

Analysing Requirements to Detect Latent Security Vulnerabilities.

Curtis C. R. Busby EarleRobert B. FranceIndrakshi Ray
Published in: SERE (Companion) (2014)
Keyphrases
  • security vulnerabilities
  • intrusion detection
  • dos attacks
  • penetration testing
  • database
  • intrusion detection system
  • network security