|
Cite as: Doble, C., Fidge, C. J. and Corney, D. (2012). Data Flow Analysis of Embedded Program Expressions. In Proc. Australasian Information Security Conference (AISC 2012) Melbourne, Australia. CRPIT, 125. Pieprzyk, J.and Thomborson, C. Eds., ACS. 71-82 |
![]() ![]() ![]() ![]() ![]() |