AUB ScholarWorks

Exploiting execution profiles for automatic generation of vulnerability-based signatures - by Marwa Mohamad El-Ghali

Files in this item

This item appears in the following Collection(s)

Search AUB ScholarWorks


Browse

My Account