Back to Results
First PageMeta Content



Poster: Exploitation of vulnerabilities - if, when and how often Kartik Nayak∗ , Daniel Marino† , Petros Efstathopoulos† , Tudor Dumitras‡ , , Daniel , Petros Efstathopoulos@sy
Add to Reading List

Document Date: 2014-05-07 16:20:42


Open Document

File Size: 106,02 KB

Share Result on Facebook