共 12 条
- [1] Aghariya T, 2015, THESIS, P1
- [2] Doshi J., 2015, INT J APPL INF SYST, V8, P51
- [3] Doupe A. L, 2014, THESIS, P1
- [4] Jan-Min Chen, 2010, 2010 International Computer Symposium (ICS 2010), P113, DOI 10.1109/COMPSYM.2010.5685537
- [5] Jovanovic N., 2006, PLAS 2006. Proceedings of the 2006 Programming Languages and Analysis for Security Workshop, P27, DOI 10.1145/1134744.1134751
- [6] Li XW, 2011, 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), P247
- [7] McAllister S, 2008, LECT NOTES COMPUT SC, V5230, P191, DOI 10.1007/978-3-540-87403-4_11
- [8] Petukhov A, 2008, DETECTING SECURITY V, P1
- [9] Ruse M. E, 2013, THESIS, P1