Article ID Journal Published Year Pages File Type
4972322 Information and Software Technology 2016 14 Pages PDF
Abstract
Conclusion: As we employ a general model for specifying the vulnerabilities and the structure of our vulnerability detection method does not depend on a specific vulnerability, our method can be extended to detect other specified vulnerabilities.
Related Topics
Physical Sciences and Engineering Computer Science Human-Computer Interaction
Authors
, ,