Login / Signup

A cost-effective strategy for software vulnerability prediction based on bellwether analysis.

Patrick Kwaku KudjoJinfu Chen
Published in: ISSTA (2019)
Keyphrases