Research Article

A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects

Figure 3

Data-dependent traverse diagram.
463912.fig.003