A Ghosh, G McGraw, FH Charron, M Schatz - Technical Report RSTR‐96 …, 1996 - Citeseer
We describe an approach and tool for analyzing the vulnerability of software applications to
anomalous events and malicious threats during software development. Traditionally …