Publisher: John Wiley & Sons Inc
E-ISSN: 1532-0634|30|6|cpe.4345-cpe.4345
ISSN: 1532-0626
Source: CONCURRENCY AND COMPUTATION: PRACTICE & EXPERIENCE (ELECTRONIC), Vol.30, Iss.6, 2018-03, pp. : n/a-n/a
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Previous Menu Next
Abstract
Related content
A complementary survey on double-loop networks
By Hwang F.K.
Theoretical Computer Science, Vol. 263, Iss. 1, 2001-07 ,pp. :
Measuring vulnerabilities and their exploitation cycle
By Morakis E. Vidalis S. Blyth A.
Information Security Technical Report, Vol. 8, Iss. 4, 2003-04 ,pp. :
Unpatched vulnerabilities - the big issues
By David J.
Network Security, Vol. 2003, Iss. 12, 2003-12 ,pp. :
Design Churn as Predictor of Vulnerabilities?
International Journal of Secure Software Engineering (IJSSE), Vol. 5, Iss. 3, 2014-07 ,pp. :