The Community for Technology Leaders
RSS Icon
Issue No.06 - November-December (2003 vol.1)
pp: 62-67
Jeannette M. Wing , Carnegie Mellon University
<p>Today's attacks exploit code-level flaws such as buffer overruns and type-invalid input. Now we should turn to tomorrow's attacks, and think beyond buffer overruns, code levels, and the horizon. This article is a call to arms to the research community to look toward the future.</p>
buffer, security, secure, code, software engineering
Jeannette M. Wing, "A Call to Action: Look Beyond the Horizon", IEEE Security & Privacy, vol.1, no. 6, pp. 62-67, November-December 2003, doi:10.1109/MSECP.2003.1253571
21 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool