Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/sac/ThompsonWM02
%A Thompson, Herbert H.
%A Whittaker, James A.
%A Mottay, Florence E.
%B SAC
%D 2002
%E Lamont, Gary B.
%E Haddad, Hisham
%E Papadopoulos, George A.
%E Panda, Brajendra
%I ACM
%K dblp
%P 260-264
%T Software security vulnerability testing in hostile environments.
%U http://dblp.uni-trier.de/db/conf/sac/sac2002.html#ThompsonWM02
%@ 1-58113-445-2
@inproceedings{conf/sac/ThompsonWM02,
added-at = {2018-11-06T00:00:00.000+0100},
author = {Thompson, Herbert H. and Whittaker, James A. and Mottay, Florence E.},
biburl = {https://www.bibsonomy.org/bibtex/286b178805e32a41a8bfc36096c30d9eb/dblp},
booktitle = {SAC},
crossref = {conf/sac/2002},
editor = {Lamont, Gary B. and Haddad, Hisham and Papadopoulos, George A. and Panda, Brajendra},
ee = {https://doi.org/10.1145/508791.508844},
interhash = {d641031ac08b01184cd70dd2e648a1d8},
intrahash = {86b178805e32a41a8bfc36096c30d9eb},
isbn = {1-58113-445-2},
keywords = {dblp},
pages = {260-264},
publisher = {ACM},
timestamp = {2018-11-07T13:13:24.000+0100},
title = {Software security vulnerability testing in hostile environments.},
url = {http://dblp.uni-trier.de/db/conf/sac/sac2002.html#ThompsonWM02},
year = 2002
}