Cited By
View all- Márquez GAstudillo HKazman R(2023)Architectural tactics in software architectureJournal of Systems and Software10.1016/j.jss.2022.111558197:COnline publication date: 13-Feb-2023
- Akram JPing L(2020)How to build a vulnerability benchmark to overcome cyber security attacksIET Information Security10.1049/iet-ifs.2018.564714:1(60-71)Online publication date: Jan-2020
- Akram JQi LLuo P(2019)VCIPR: Vulnerable Code is Identifiable When a Patch is Released (Hacker's Perspective)2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST)10.1109/ICST.2019.00049(402-413)Online publication date: Apr-2019
- Show More Cited By