Author: Monmonier Mark
Publisher: Maney Publishing
ISSN: 1743-2774
Source: The Cartographic Journal, Vol.50, Iss.2, 2013-05, pp. : 171-174
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Related content
Measuring vulnerabilities and their exploitation cycle
By Morakis E. Vidalis S. Blyth A.
Information Security Technical Report, Vol. 8, Iss. 4, 2003-04 ,pp. :
Unpatched vulnerabilities - the big issues
By David J.
Network Security, Vol. 2003, Iss. 12, 2003-12 ,pp. :
Design Churn as Predictor of Vulnerabilities?
International Journal of Secure Software Engineering (IJSSE), Vol. 5, Iss. 3, 2014-07 ,pp. :
A survey of the double‐fetch vulnerabilities
CONCURRENCY AND COMPUTATION: PRACTICE & EXPERIENCE (ELECTRONIC), Vol. 30, Iss. 6, 2018-03 ,pp. :
By Dumas Marlon Aldred Lachlan Governatori Guido ter Hofstede Arthur H.M.
Electronic Commerce Research, Vol. 5, Iss. 1, 2005-01 ,pp. :