CITATION STYLE
Weaknesses Exploited. (2006). In Computer Viruses and Malware (pp. 109–141). Springer US. https://doi.org/10.1007/0-387-34188-9_6
Mendeley helps you to discover research relevant for your work.
Save time finding and organizing research with Mendeley