Login / Signup
A Sweet Recipe for Consolidated Vulnerabilities: Attacking a Live Website by Harnessing a Killer Combination of Vulnerabilities.
Mazharul Islam
Md. Nazmuddoha Ansary
Novia Nurain
Salauddin Parvez Shams
A. B. M. Alim Al Islam
Published in:
CoRR (2019)
Keyphrases
</>
information security
website
countermeasures
security vulnerabilities
security risks
security issues
real time
machine learning
security requirements
buffer overflow
database
information retrieval
multimedia
web content
attack graphs