Author:
Stanley William,Laski Janusz
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Mining Network Security Holes Based on Data Flow Analysis in Smart Grid;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2020
2. Program Analysis Is Harder Than Verification: A Computability Perspective;Computer Aided Verification;2018
3. A Production Model System for Detecting Vulnerabilities in the Software Source Code;Proceedings of the 8th International Conference on Security of Information and Networks;2015-09-08