Login / Signup
Stealthy software: Next-generation cyber-attacks and defenses.
Kevin W. Hamlen
Published in:
ISI (2013)
Keyphrases
</>
cyber attacks
dos attacks
computer systems
cyber security
software development
countermeasures
source code
real time
data mining
network security
lightweight
software architecture
intrusion detection system
security policies