Login / Signup
An effective computational technique for taxonomic position of security vulnerability in software development.
Amit Kumar Srivastava
Shishir Kumar
Published in:
J. Comput. Sci. (2018)
Keyphrases
</>
software development
risk assessment
software systems
information security
statistical databases
security requirements
case study
software engineering
security issues
buffer overflow