[1]
Z. Huang, G. Tan, and X. Yu, “Mitigating Vulnerabilities in Closed Source Software”, EAI Endorsed Trans Sec Saf, vol. 8, no. 30, p. e4, Aug. 2022.