Automated detection on the security of the linked-list operations
Hongyu KUANG, Jian WANG, Ruilin LI, Chao FENG, YunFei SU, Xing ZHANG
Automated detection on the security of the linked-list operations
[1] |
Dowd M, McDonald J, Schuh J. The art of software security assessment: Identifying and preventing software vulnerabilities. Addison Wesley Professional, 2007
|
[2] |
Liu F , Li G , Hu X . Program Comprehension Based on Deep learning. Journal of Computer Research and Development, 2019, 56( 8): 1605– 1620
|
/
〈 | 〉 |