Login / Signup

Model-based Cluster Analysis for Identifying Suspicious Activity Sequences in Software.

Hemank LambaThomas J. GlazierJavier CámaraBradley R. SchmerlDavid GarlanJürgen Pfeffer
Published in: IWSPA@CODASPY (2017)
Keyphrases