Author:
Pramanick Koyel,Kulkarni Prasad A.
Publisher
Springer International Publishing
Reference37 articles.
1. Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-flow integrity principles, implementations, and applications. ACM Trans. Inf. Syst. Secur. 13(1) (2009)
2. Abijah Roseline, S., Geetha, S.: A comprehensive survey of tools and techniques mitigating computer and mobile malware attacks. Comput. Electr. Eng. 92, 107143 (2021)
3. Aycock, J.: Computer Viruses and Malware (Advances in Information Security). Springer, Heidelberg (2006). https://doi.org/10.1007/0-387-34188-9
4. Advances in Intelligent Systems and Computing;TN Brooks,2019
5. Cadar, C., Dunbar, D., Engler, D.R., et al.: Klee: unassisted and automatic generation of high-coverage tests for complex systems programs. In: OSDI, vol. 8, pp. 209–224 (2008)