|
Volumn 3, Issue 1, 2005, Pages 14-19
|
Is finding security holes a good idea?
a
RTFM
*
|
Author keywords
[No Author keywords available]
|
Indexed keywords
COMPUTER CRIME;
COMPUTER OPERATING SYSTEMS;
COMPUTER PROGRAMMING;
COSTS;
MATHEMATICAL MODELS;
QUALITY ASSURANCE;
SECURITY OF DATA;
BLACKHAT DISCOBERY (BHD);
VULNERABILITY;
VULNERABILITY LIFE CYCLE;
WHITEHAT DISCOVERY (WHD);
SOFTWARE ENGINEERING;
|
EID: 14744276335
PISSN: 15407993
EISSN: None
Source Type: Journal
DOI: 10.1109/MSP.2005.17 Document Type: Review |
Times cited : (187)
|
References (8)
|