{"labels":{"en":"Analysis of software vulnerability detection methods"},"descriptions":{"en":"scientific paper published in CEUR-WS Volume 4150"},"claims":{"P31":"Q13442814","P1433":null,"P1476":{"text":"Analysis of software vulnerability detection methods","language":"en"},"P407":"Q1860","P953":"https://ceur-ws.org/Vol-4150/paper5.pdf","P50":[],"P2093":[{"value":"Liudmyla Gryzun","qualifiers":{"P1545":"1"}},{"value":"Alla Havrylova","qualifiers":{"P1545":"2"}},{"value":"Andrii Tkachov","qualifiers":{"P1545":"3"}},{"value":"Andrii Hapon","qualifiers":{"P1545":"4"}},{"value":"Natalia Brynza","qualifiers":{"P1545":"5"}}]}}