Guo Tao
China Information Technology Security Evaluation Center, Beijing, China
Dong Guowei
China Information Technology Security Evaluation Center, Beijing, China
Qin Hu
China Information Technology Security Evaluation Center, Beijing, China
Long Baolian
School of Computer, Beijing University of Posts and Telecommunications, Beijing, 100876, China
Qu Tong
School of Computer, Beijing University of Posts and Telecommunications, Beijing, 100876, China
Cui Baojiang
School of Computer, Beijing University of Posts and Telecommunications, Beijing, 100876, China
PDF References Citation
How to cite this article
Guo Tao, Dong Guowei, Qin Hu, Long Baolian, Qu Tong and Cui Baojiang, 2013. Defect Detection Technique Based on Similarity Comparison of Token. Journal of Applied Sciences, 13: 4270-4277.
DOI: 10.3923/jas.2013.4270.4277
URL: https://scialert.net/abstract/?doi=jas.2013.4270.4277
DOI: 10.3923/jas.2013.4270.4277
URL: https://scialert.net/abstract/?doi=jas.2013.4270.4277