Concepedia

Publication | Closed Access

Exploit Programming: From Buffer Overflows to "Weird Machines" and Theory of Computation.

85

Citations

0

References

2011

Year

No additional data available for this publication yet. Check back later!