Login / Signup

An effective computational technique for taxonomic position of security vulnerability in software development.

Amit Kumar SrivastavaShishir Kumar
Published in: J. Comput. Sci. (2018)
Keyphrases
  • software development
  • risk assessment
  • software systems
  • information security
  • statistical databases
  • security requirements
  • case study
  • software engineering
  • security issues
  • buffer overflow