Login / Signup
Detecting applications vulnerabilities using remote procedure calls.
Lukas Jokubauskas
Jevgenijus Toldinas
Borisas Lozinskis
Published in:
IVUS (2022)
Keyphrases
</>
real time
information security
search engine
database
information retrieval
genetic algorithm
search algorithm
formal model
security vulnerabilities
buffer overflow