@dblp

Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications.

, , , and . CSF, page 203-216. IEEE Computer Society, (2017)

Links and resources

Tags