Login / Signup
Characteristics of the vulnerable code changes identified through peer code review.
Amiangshu Bosu
Published in:
ICSE Companion (2014)
Keyphrases
</>
source code
data mining
image processing
data sets
data flow
static analysis