Login / Signup

One Technique is Not Enough: A Comparison of Vulnerability Discovery Techniques.

Andrew AustinLaurie A. Williams
Published in: ESEM (2011)
Keyphrases
  • object recognition
  • search algorithm
  • special case
  • knowledge discovery
  • quantitative evaluation