Login / Signup
Unintentional bugs to vulnerability mapping in Android applications.
Garima Bajwa
Mohamed Fazeen
Ram Dantu
Sonal Tanpure
Published in:
ISI (2015)
Keyphrases
</>
security vulnerabilities
database
databases
similarity measure
source code
software development
intrusion detection
root cause