149a437f79ff59637d6eeecc1576a0de3988d752 Arnau_Piqu_article_final_systematic_use_of_tools_for_detecting_computer_vulnerabilities.pdf