Vol-3610⫷ Vol-3611 ⫸Vol-3612
urn:nbn:de:0074-3611-0


Vol-3611/paper9⫷Vol-3611/paper10⫸Vol-3611/paper11

Detecting applications vulnerabilities using remote procedure calls