원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.9 No.5
2015.05
pp.95-104
피인용수 : 0건 (자료제공 : 네이버학술정보)
목차
Abstract
1. Introduction
2. Related Works
3. Analysis Software Defects
3.1. View Program Generation
3.2 The View of Attacker
4. The Models of Extracting the Software Intended Behavior
5. Experiment Evaluation
6. Conclusions
Reference
1. Introduction
2. Related Works
3. Analysis Software Defects
3.1. View Program Generation
3.2 The View of Attacker
4. The Models of Extracting the Software Intended Behavior
5. Experiment Evaluation
6. Conclusions
Reference
저자정보
참고문헌
자료제공 : 네이버학술정보
