Sciweavers

16 search results - page 4 / 4
» Looking at Large Networks: Coding vs. Queueing
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 10 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw