-
1
Survey on static software vulnerability detection for source code
Published 2019-02-01Subjects: “…software vulnerability…”
Get full text
Article -
2
Exploit detection based on illegal control flow transfers identification
Published 2014-09-01Subjects: “…software vulnerability…”
Get full text
Article -
3
Security capability analysis of software-based heterogeneous redundant execution system
Published 2021-09-01Subjects: Get full text
Article