Sign in

Using Software Structure to Predict Vulnerability Exploitation Potential.

Awad A. YounisYashwant K. Malaiya
Published in: SERE (Companion) (2014)
Keyphrases