Login / Signup
An Automated Vulnerability Assessment Approach for WebAPI that Considers Requests and Responses.
Toru Taya
Masaki Hanada
Yoichi Murakami
Atsushi Waseda
Yuki Ishida
Takao Mimura
Moo Wan Kim
Eiji Nunohiro
Published in:
ICACT (2022)
Keyphrases
</>
risk assessment
semi automated
fully automated
automated analysis
computer assisted
real time
multi agent systems
user requests
takes into consideration
computer aided
multi agent
database systems
image segmentation
image processing
knowledge base
computer vision
neural network
databases