[1]
M. V. Kolomytsev and S. A. Nosok, “APPLICATIONS VULNERABILITIES CAUSED BY INCORRECT INPUT DATA”, RIC, no. 1, Aug. 2011.