Research Article

A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects

Figure 8

Location effect of the function fault.
463912.fig.008