Sign in

Two threat patterns that exploit "security misconfiguration" and "sensitive data exposure" vulnerabilities.

Rohini SulatyckiEduardo B. Fernández
Published in: EuroPLoP (2015)
Keyphrases