Login / Signup

Identifying security vulnerabilities through input flow tracing and analysis.

Simeon Xenitellis
Published in: Inf. Manag. Comput. Secur. (2003)
Keyphrases
  • security vulnerabilities
  • data analysis