Login / Signup
More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations.
Ethan Shernan
Henry Carter
Dave Tian
Patrick Traynor
Kevin R. B. Butler
Published in:
DIMVA (2015)
Keyphrases
</>
efficient implementation
rule sets
association rules
decision rules
data sets
association rule mining
security vulnerabilities
rule induction
inference engine
human experts
classification rules
database
database systems
information systems
artificial intelligence
genetic algorithm
databases
real time