|
Volumn , Issue , 2007, Pages 815-818
|
How to counter control flow tampering attacks
|
Author keywords
[No Author keywords available]
|
Indexed keywords
ACCESSIBILITY;
BUSINESS ACTIVITIES;
MALICIOUS USERS;
WEB APPLICATIONS;
ACCESS CONTROL;
RELIABILITY THEORY;
SHAREHOLDERS;
SOCIETIES AND INSTITUTIONS;
USER INTERFACES;
WORLD WIDE WEB;
INTRUSION DETECTION;
|
EID: 36248941952
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/AICCSA.2007.370726 Document Type: Conference Paper |
Times cited : (1)
|
References (9)
|