Author: David J.
Publisher: Elsevier
ISSN: 1353-4858
Source: Network Security, Vol.2003, Iss.12, 2003-12, pp. : 10-14
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
A Big Picture on Recent Vulnerabilities - Active AX, Web server compromises and insecure documents
Network Security, Vol. 2003, Iss. 8, 2003-08 ,pp. :
Measuring vulnerabilities and their exploitation cycle
By Morakis E. Vidalis S. Blyth A.
Information Security Technical Report, Vol. 8, Iss. 4, 2003-04 ,pp. :
Design Churn as Predictor of Vulnerabilities?
International Journal of Secure Software Engineering (IJSSE), Vol. 5, Iss. 3, 2014-07 ,pp. :