[1]
Esam Mohamed Elwan, “AUTOMATIC GENERATION OF CONTROL, FLOW HIJACKING EXPLOITS FOR SOFTWARE VULNERABILITIES”, IJCISS, vol. 5, no. 10, pp. 22–82, Sep. 2023.