Login / Signup

Data-Flow Based Analysis of Java Bytecode Vulnerability.

Gang ZhaoHua ChenDongxia Wang
Published in: WAIM (2008)
Keyphrases
  • data flow
  • database machine
  • control flow
  • database systems
  • relational databases