1.
Esam Mohamed Elwan. AUTOMATIC GENERATION OF CONTROL, FLOW HIJACKING EXPLOITS FOR SOFTWARE VULNERABILITIES. IJCISS [Internet]. 2023 Sep. 29 [cited 2024 May 14];5(10):22-8. Available from: https://ijciss.com/index.php/j1/article/view/73