@dblp

To Fear or Not to Fear That is the Question: Code Characteristics of a Vulnerable Functionwith an Existing Exploit.

, , , and . CODASPY, page 97-104. ACM, (2016)

Links and resources

Tags