Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/ihsi/LiuHWCR20
%A Liu, Jie
%A He, Da
%A Wang, Yifan
%A Chen, Jianfeng
%A Rao, Zhihong
%B IHSI
%D 2020
%E Ahram, Tareq Z.
%E Karwowski, Waldemar
%E Vergnano, Alberto
%E Leali, Francesco
%E Taïar, Redha
%I Springer
%K dblp
%P 532-538
%T Software Vulnerability Mining Based on the Human-Computer Coordination.
%U http://dblp.uni-trier.de/db/conf/ihsi/ihsi2020.html#LiuHWCR20
%V 1131
%@ 978-3-030-39512-4
@inproceedings{conf/ihsi/LiuHWCR20,
added-at = {2020-01-27T00:00:00.000+0100},
author = {Liu, Jie and He, Da and Wang, Yifan and Chen, Jianfeng and Rao, Zhihong},
biburl = {https://www.bibsonomy.org/bibtex/2e4a73e94cb815bc14d7df9b35c8b40ab/dblp},
booktitle = {IHSI},
crossref = {conf/ihsi/2020},
editor = {Ahram, Tareq Z. and Karwowski, Waldemar and Vergnano, Alberto and Leali, Francesco and Taïar, Redha},
ee = {https://doi.org/10.1007/978-3-030-39512-4_83},
interhash = {dd794956d21774bb196e084e7d039da6},
intrahash = {e4a73e94cb815bc14d7df9b35c8b40ab},
isbn = {978-3-030-39512-4},
keywords = {dblp},
pages = {532-538},
publisher = {Springer},
series = {Advances in Intelligent Systems and Computing},
timestamp = {2020-01-28T11:40:21.000+0100},
title = {Software Vulnerability Mining Based on the Human-Computer Coordination.},
url = {http://dblp.uni-trier.de/db/conf/ihsi/ihsi2020.html#LiuHWCR20},
volume = 1131,
year = 2020
}