Identifying the characteristics of vulnerable code changes: an empirical study
Conference: FSE 2014
Methodologies: Evaluation,
Contribution: Automation, Quality assurance, Potential benefits,
Summary: Identification of security vulnerabilities in CR
Search by google scholor