Sign in

Unintentional bugs to vulnerability mapping in Android applications.

Garima BajwaMohamed FazeenRam DantuSonal Tanpure
Published in: ISI (2015)
Keyphrases
  • security vulnerabilities
  • database
  • databases
  • similarity measure
  • source code
  • software development
  • intrusion detection
  • root cause