Login / Signup

Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application.

Sarah ElderNusrat ZahanRui ShuMonica MetroValeri KozarevTim MenziesLaurie A. Williams
Published in: CoRR (2022)
Keyphrases