Login / Signup
Automated Vulnerability Assessment Approach for Web API that Considers Requests and Responses.
Yuki Ishida
Masaki Hanada
Atsushi Waseda
Moo Wan Kim
Published in:
ICACT (2024)
Keyphrases
</>
risk assessment
third party
web apis
mashup
case study
user interface
web applications
data integration
linked data