Towards Generating High Coverage Vulnerability-Based Signatures With Protocol-Level Constraint-Guided Exploration

Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-642-04342-0_9
Full Text
Abstract

Available in full text

Date
Authors
Publisher

Springer Berlin Heidelberg


Related search