Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
4972322 | Information and Software Technology | 2016 | 14 Pages |
Abstract
Conclusion:
As we employ a general model for specifying the vulnerabilities and the structure of our vulnerability detection method does not depend on a specific vulnerability, our method can be extended to detect other specified vulnerabilities.
Keywords
Related Topics
Physical Sciences and Engineering
Computer Science
Human-Computer Interaction
Authors
Maryam Mouzarani, Babak Sadeghiyan,