Login / Signup
A methodology for automated penetration testing of cloud applications.
Valentina Casola
Alessandra De Benedictis
Massimiliano Rak
Umberto Villano
Published in:
Int. J. Grid Util. Comput. (2020)
Keyphrases
</>
software architecture
penetration testing
cloud computing
information systems
electronic commerce
security vulnerabilities