共 97 条
[1]
[Anonymous], 2019, A proactive approach to more secure code
[2]
[Anonymous], 1999, INT STANDARD ISOIEC
[3]
[Anonymous], 2013, Cve details: The ultimate security vulnerability datasource
[4]
[Anonymous], 54. Instituto Nacional de Estatistica-Conta Satelite da Saude 2020. Lisboa: INE, 2021. Available (only in Portuguese) at: https://www.ine.pt/xportal/xmain?xpidINExpgidine_cnacionais2010b2016contextocsselTabtab3perfil392023991INST391970297xlangen. Reporting to Table E.4.2.1.1-Current expenditure on health by function of care and financing agent and memory items (current prices). Provisory values for 2019.
[5]
Verified Sequential Malloc/Free
[J].
PROCEEDINGS OF THE 2020 ACM SIGPLAN INTERNATIONAL SYMPOSIUM ON MEMORY MANAGEMENT, ISMM 2020,
2020,
:48-59
[6]
Appel AW, 2011, LECT NOTES COMPUT SC, V6602, P1, DOI 10.1007/978-3-642-19718-5_1
[7]
Berger ED, 2006, ACM SIGPLAN NOTICES, V41, P158, DOI 10.1145/1133981.1134000
[8]
Berger Emery D., 2012, Software Needs Seatbelts and Airbags: Finding and Fixing Bugs in Deployed Software is Difficult and Time-Consuming. Here Are Some Alternatives, DOI 10.11452330667.2330683
[9]
Bosamiya J, 2022, PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, P1975