Abstract
Security research can be improved by more effectively sharing what is learned from attacks on information systems.
Publisher
Association for Computing Machinery (ACM)
Reference6 articles.
1. Coverity Scan: 2011 Open Source Integrity Report. Coverity Inc. San Francisco CA 2011. Coverity Scan: 2011 Open Source Integrity Report . Coverity Inc. San Francisco CA 2011.
2. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
3. Breaking and fixing the Needham-Schroeder public-key protocol using FDR;Lowe G;Software---Concepts and Tools,1996
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献