Login / Signup

Accurate Architectural Threat Elicitation From Source Code Through Hybrid Information Flow Analysis.

Bernd Gruner
Published in: ICSE Companion (2024)
Keyphrases