Login / Signup

To Fear or Not to Fear That is the Question: Code Characteristics of a Vulnerable Functionwith an Existing Exploit.

Awad A. YounisYashwant K. MalaiyaCharles AndersonIndrajit Ray
Published in: CODASPY (2016)
Keyphrases
  • data sets
  • neural network
  • information systems
  • digital libraries
  • special case
  • source code
  • image processing
  • multimedia
  • probabilistic model