Login / Signup

Characteristics of the vulnerable code changes identified through peer code review.

Amiangshu Bosu
Published in: ICSE Companion (2014)
Keyphrases
  • source code
  • data mining
  • image processing
  • data sets
  • data flow
  • static analysis