Application of compiler transformations against software vulnerabilities exploitation
Crossref DOI link: https://doi.org/10.1134/S0361768815040052
Published Online: 2015-07-25
Published Print: 2015-07
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Nurmukhametov, A. R.
Kurmangaleev, Sh. F.
Kaushan, V. V.
Gaissaryan, S. S.
Text and Data Mining valid from 2015-07-01