Sciweavers

71 search results - page 15 / 15
» Modeling, Analysis and Improvement for BitTorrent-Like File ...
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 10 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw