Login / Signup
Analysis of vulnerability fixing process in the presence of incorrect patches.
Misbah Anjum
Shakshi Singhal
P. K. Kapur
Sunil Kumar Khatri
Saurabh Panwar
Published in:
J. Syst. Softw. (2023)
Keyphrases
</>
image analysis
three dimensional
data analysis
real time
databases
data mining
risk assessment