(1)
Esam Mohamed Elwan. AUTOMATIC GENERATION OF CONTROL, FLOW HIJACKING EXPLOITS FOR SOFTWARE VULNERABILITIES. IJCISS 2023, 5, 22-82.