|
|
|
Tingyang Gu, Minyan Lu, Luyi Li and Qiuying Li
Current research on software vulnerability analysis mostly focus on source codes or executable programs. But these methods can only be applied after software is completely developed when source codes are available. This may lead to high costs and tremend...
ver más
|
|
|