Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow.
Kindson MunonyePeter MartinekPublished in: Int. J. Inf. Sec. (2022)
Keyphrases
- machine learning
- security requirements
- learning algorithm
- detection accuracy
- automatic detection
- object detection
- detection algorithm
- machine learning methods
- access control
- detection method
- machine learning algorithms
- false positives
- inductive logic programming
- false alarms
- information extraction
- supervised learning
- text classification
- flow patterns
- computer science
- learning systems
- reinforcement learning
- feature selection
- trust negotiation
- computer vision
- decision trees
- detection rate
- anomaly detection
- support vector machine