21fc10645cfd51e0ff5f3569b339c2455411e0bb491ce3927dc0ee312c8b1151 Arnau_Piqu_article_final_systematic_use_of_tools_for_detecting_computer_vulnerabilities.pdf