Research Article

A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects

Figure 2

Data-dependent storage diagram.
463912.fig.002