Cited By
View all- Shahriar HZulkernine M(2012)Mitigating program security vulnerabilitiesACM Computing Surveys (CSUR)10.1145/2187671.218767344:3(1-46)Online publication date: 14-Jun-2012
- Shahriar HZulkernine M(2011)Taxonomy and classification of automatic monitoring of program security vulnerability exploitationsJournal of Systems and Software10.1016/j.jss.2010.09.02084:2(250-269)Online publication date: 1-Feb-2011
- Breech BTegtmeyer MPollock L(2006)An Attack Simulator for Systematically Testing Program-based Security MechanismsProceedings of the 17th International Symposium on Software Reliability Engineering10.1109/ISSRE.2006.12(136-145)Online publication date: 7-Nov-2006
- Show More Cited By