Login / Signup
A SPIN-based approach for detecting vulnerabilities in C programs.
Natalia Kushik
Amel Mammar
Ana R. Cavalli
Nina Yevtushenko
Willy Jimenez
Edgardo Montes de Oca
Published in:
Autom. Control. Comput. Sci. (2012)
Keyphrases
</>
computer programs
real time
automatic detection
security vulnerabilities
information systems
relational databases
computer systems
information security
countermeasures