Inproceedings,

Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration.

, , , and .
RAID, volume 5758 of Lecture Notes in Computer Science, page 161-181. Springer, (2009)

Meta data

Tags

Users

  • @dblp

Comments and Reviews