Login / Signup
Using Program Analysis to Identify the Use of Vulnerable Functions.
Rasmus Hagberg
Martin Hell
Christoph Reichenbach
Published in:
SECRYPT (2021)
Keyphrases
</>
data mining
information retrieval
database
information systems
decision making
image processing
search algorithm
upper bound
basis functions