Cited By
View all- Bertrand Van Ouytsel CLegay A(2023)Malware Analysis with Symbolic Execution and Graph KernelSecure IT Systems10.1007/978-3-031-22295-5_16(292-310)Online publication date: 1-Jan-2023
- Ye ZShi D(2018)Augmenting Concolic Testing with Weighted Constraints-Based SearchRecent Developments in Intelligent Computing, Communication and Devices10.1007/978-981-10-8944-2_14(111-119)Online publication date: 23-Aug-2018