Author: Morakis E. Vidalis S. Blyth A.
Publisher: Elsevier
ISSN: 1363-4127
Source: Information Security Technical Report, Vol.8, Iss.4, 2003-04, pp. : 45-55
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Unpatched vulnerabilities - the big issues
By David J.
Network Security, Vol. 2003, Iss. 12, 2003-12 ,pp. :
Design Churn as Predictor of Vulnerabilities?
International Journal of Secure Software Engineering (IJSSE), Vol. 5, Iss. 3, 2014-07 ,pp. :
A survey of the double‐fetch vulnerabilities
CONCURRENCY AND COMPUTATION: PRACTICE & EXPERIENCE (ELECTRONIC), Vol. 30, Iss. 6, 2018-03 ,pp. :