Identifying the characteristics of vulnerable code changes: an empirical study

Conference: FSE 2014

Methodologies: Evaluation,

Contribution: Automation, Quality assurance, Potential benefits,

Summary: Identification of security vulnerabilities in CR

Search by google scholor