Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Exploiting Metaobjects to Reinforce Data Leakage Attacks

Full metadata record
DC Field Value Language
dc.contributor.authorJUNBEOM HUR-
dc.date.accessioned2022-07-23T04:40:19Z-
dc.date.available2022-07-23T04:40:19Z-
dc.date.created2022-07-23-
dc.date.issued2022-10-27-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/142567-
dc.publisherRAID-
dc.titleExploiting Metaobjects to Reinforce Data Leakage Attacks-
dc.title.alternativeExploiting Metaobjects to Reinforce Data Leakage Attacks-
dc.typeConference-
dc.contributor.affiliatedAuthorJUNBEOM HUR-
dc.identifier.bibliographicCitationInternational Symposium on Research in Attacks, Intrusions and Defenses (RAID)-
dc.relation.isPartOfInternational Symposium on Research in Attacks, Intrusions and Defenses (RAID)-
dc.relation.isPartOfInternational Symposium on Research in Attacks, Intrusions and Defenses-
dc.citation.titleInternational Symposium on Research in Attacks, Intrusions and Defenses (RAID)-
dc.citation.conferencePlaceCY-
dc.citation.conferenceDate2022-10-26-
dc.type.rimsCONF-
dc.description.journalClass1-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer Science and Engineering > 2. Conference Papers

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE