Max Slocum

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Computer hackers or their malware surrogates constantly look for software vulnerabilities in the cyberspace to perform various online crimes, such as identity theft, cyber espionage, and denial of service attacks. It is thus crucial to assess accurately the likelihood that a software can be exploited before it is put into practical use. In this work, we(More)
  • 1