First Page | Document Content | |
---|---|---|
Date: 2014-05-29 15:38:01Computer security Cyberwarfare Computing Computer network security Software testing Vulnerability Hacking Zero-day Buffer overflow Metasploit Project Code injection Social vulnerability | 224 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 5,Add to Reading ListSource URL: users.ece.cmu.eduDownload Document from Source WebsiteFile Size: 1,83 MBShare Document on Facebook |