Research Article

A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects

Figure 4

Basic idea description block diagram.
463912.fig.004