Login / Signup

Formally modeling deceptive patches using a game-based approach.

Jeffrey AveryJohn Ross Wallrabenstein
Published in: Comput. Secur. (2018)
Keyphrases