![]() |
Volumn 9783319044477, Issue , 2014, Pages 149-155
|
A method for resolving security vulnerabilities through the use of design patterns
|
Author keywords
Memory corruption; Patterns; Taxonomy; Vulnerabilities
|
Indexed keywords
APPLICATION PROGRAMS;
CRIME;
SOFTWARE DESIGN;
SOFTWARE TESTING;
DESIGN PATTERNS;
MEMORY CORRUPTION;
PATTERN;
PATTERN LANGUAGES;
SECURITY VULNERABILITIES;
SOFTWARE ENGINEERING DOMAIN;
SOFTWARE TESTINGS;
SOFTWARE THREATS;
SOFTWARE VULNERABILITIES;
VULNERABILITY;
TAXONOMIES;
|
EID: 84926203510
PISSN: None
EISSN: None
Source Type: Book
DOI: 10.1007/978-3-319-04447-7_12 Document Type: Chapter |
Times cited : (1)
|
References (3)
|