Login / Signup
Request and Conquer: Exposing Cross-Origin Resource Size.
Tom van Goethem
Mathy Vanhoef
Frank Piessens
Wouter Joosen
Published in:
USENIX Security Symposium (2016)
Keyphrases
</>
resource allocation
resource management
genetic algorithm
website
face recognition
evolutionary algorithm
resource requirements