The Community for Technology Leaders
Green Image
Issue No. 06 - November-December (2003 vol. 1)
ISSN: 1540-7993
pp: 62-67
Jeannette M. Wing , Carnegie Mellon University
<p>Today's attacks exploit code-level flaws such as buffer overruns and type-invalid input. Now we should turn to tomorrow's attacks, and think beyond buffer overruns, code levels, and the horizon. This article is a call to arms to the research community to look toward the future.</p>
buffer, security, secure, code, software engineering

J. M. Wing, "A Call to Action: Look Beyond the Horizon," in IEEE Security & Privacy, vol. 1, no. , pp. 62-67, 2003.
88 ms
(Ver 3.3 (11022016))