Verifying OAuth Implementations Through Encrypted Network Analysis.
Josh TalkingtonRam DantuKirill MorozovPublished in: SACMAT (2019)
Keyphrases
- network analysis
- social network analysis
- complex networks
- information networks
- link prediction
- network structure
- text mining
- dynamic networks
- social networks
- community detection
- model checking
- graph theory
- encryption key
- graph clustering
- machine learning
- knowledge base
- centrality measures
- active learning
- biological networks
- real world networks
- real world
- database