Security Vulnerabilities: From Analysis to Detection and Masking Techniques. Chen, S., Xu, J., Kalbarczyk, Z. T., & Iyer, R. K. Proceedings of the IEEE, 94(2):407–418, 2006.
Security Vulnerabilities: From Analysis to Detection and Masking Techniques [link]Paper  doi  bibtex   
@article{DBLP:journals/pieee/ChenXKI06,
  author    = {Shuo Chen and
               Jun Xu and
               Zbigniew T. Kalbarczyk and
               Ravishankar K. Iyer},
  title     = {Security Vulnerabilities: From Analysis to Detection and Masking Techniques},
  journal   = {Proceedings of the {IEEE}},
  volume    = {94},
  number    = {2},
  pages     = {407--418},
  year      = {2006},
  url       = {https://doi.org/10.1109/JPROC.2005.862473},
  doi       = {10.1109/JPROC.2005.862473},
  timestamp = {Wed, 23 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/pieee/ChenXKI06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0