메뉴 건너뛰기




Volumn 9783319044477, Issue , 2014, Pages 149-155

A method for resolving security vulnerabilities through the use of design patterns

Author keywords

Memory corruption; Patterns; Taxonomy; Vulnerabilities

Indexed keywords

APPLICATION PROGRAMS; CRIME; SOFTWARE DESIGN; SOFTWARE TESTING;

EID: 84926203510     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-3-319-04447-7_12     Document Type: Chapter
Times cited : (1)

References (3)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.