Login / Signup
Identifying security vulnerabilities through input flow tracing and analysis.
Simeon Xenitellis
Published in:
Inf. Manag. Comput. Secur. (2003)
Keyphrases
</>
security vulnerabilities
data analysis