2010
DOI: 10.1007/978-3-642-14400-4_1
|View full text |Cite
|
Sign up to set email alerts
|

Moving Targets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2011
2011
2011
2011

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 24 publications
0
1
0
Order By: Relevance
“…Research and development activities in computer security are evolving as rapidly as the computer attacks are metamorphizing [1,5,7]. As soon as a new threat is discovered, the challenge is to devise an effective way of representing the patterns, so that the threats can be effectively detected among the flow of legitimate patterns.…”
mentioning
confidence: 99%
“…Research and development activities in computer security are evolving as rapidly as the computer attacks are metamorphizing [1,5,7]. As soon as a new threat is discovered, the challenge is to devise an effective way of representing the patterns, so that the threats can be effectively detected among the flow of legitimate patterns.…”
mentioning
confidence: 99%