Security Vulnerabilities: From Analysis to Detection and Masking Techniques. Chen, S., Xu, J., Kalbarczyk, Z. T., & Iyer, R. K. Proceedings of the IEEE, 94(2):407–418, 2006. Paper doi bibtex @article{DBLP:journals/pieee/ChenXKI06,
author = {Shuo Chen and
Jun Xu and
Zbigniew T. Kalbarczyk and
Ravishankar K. Iyer},
title = {Security Vulnerabilities: From Analysis to Detection and Masking Techniques},
journal = {Proceedings of the {IEEE}},
volume = {94},
number = {2},
pages = {407--418},
year = {2006},
url = {https://doi.org/10.1109/JPROC.2005.862473},
doi = {10.1109/JPROC.2005.862473},
timestamp = {Wed, 23 May 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/pieee/ChenXKI06},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"QrLm3zjkmLdiofbJQ","bibbaseid":"chen-xu-kalbarczyk-iyer-securityvulnerabilitiesfromanalysistodetectionandmaskingtechniques-2006","downloads":0,"creationDate":"2018-12-15T20:25:17.241Z","title":"Security Vulnerabilities: From Analysis to Detection and Masking Techniques","author_short":["Chen, S.","Xu, J.","Kalbarczyk, Z. T.","Iyer, R. K."],"year":2006,"bibtype":"article","biburl":"https://dblp.org/pid/i/RavishankarKIyer.bib","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Shuo"],"propositions":[],"lastnames":["Chen"],"suffixes":[]},{"firstnames":["Jun"],"propositions":[],"lastnames":["Xu"],"suffixes":[]},{"firstnames":["Zbigniew","T."],"propositions":[],"lastnames":["Kalbarczyk"],"suffixes":[]},{"firstnames":["Ravishankar","K."],"propositions":[],"lastnames":["Iyer"],"suffixes":[]}],"title":"Security Vulnerabilities: From Analysis to Detection and Masking Techniques","journal":"Proceedings of the IEEE","volume":"94","number":"2","pages":"407–418","year":"2006","url":"https://doi.org/10.1109/JPROC.2005.862473","doi":"10.1109/JPROC.2005.862473","timestamp":"Wed, 23 May 2018 01:00:00 +0200","biburl":"https://dblp.org/rec/bib/journals/pieee/ChenXKI06","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/pieee/ChenXKI06,\n author = {Shuo Chen and\n Jun Xu and\n Zbigniew T. Kalbarczyk and\n Ravishankar K. Iyer},\n title = {Security Vulnerabilities: From Analysis to Detection and Masking Techniques},\n journal = {Proceedings of the {IEEE}},\n volume = {94},\n number = {2},\n pages = {407--418},\n year = {2006},\n url = {https://doi.org/10.1109/JPROC.2005.862473},\n doi = {10.1109/JPROC.2005.862473},\n timestamp = {Wed, 23 May 2018 01:00:00 +0200},\n biburl = {https://dblp.org/rec/bib/journals/pieee/ChenXKI06},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Chen, S.","Xu, J.","Kalbarczyk, Z. T.","Iyer, R. K."],"key":"DBLP:journals/pieee/ChenXKI06","id":"DBLP:journals/pieee/ChenXKI06","bibbaseid":"chen-xu-kalbarczyk-iyer-securityvulnerabilitiesfromanalysistodetectionandmaskingtechniques-2006","role":"author","urls":{"Paper":"https://doi.org/10.1109/JPROC.2005.862473"},"downloads":0},"search_terms":["security","vulnerabilities","analysis","detection","masking","techniques","chen","xu","kalbarczyk","iyer"],"keywords":[],"authorIDs":[],"dataSources":["oReyvN2rDfSfvMRG3"]}