Login / Signup

Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities.

Ben H. SmithLaurie A. Williams
Published in: ICST (2011)
Keyphrases