Login / Signup
Data-Flow Based Analysis of Java Bytecode Vulnerability.
Gang Zhao
Hua Chen
Dongxia Wang
Published in:
WAIM (2008)
Keyphrases
</>
data flow
database machine
control flow
database systems
relational databases