Login / Signup
Web Application Weakness Ontology Based on Vulnerability Data.
Onyeka Ezenwoye
Yi Liu
Published in:
CoRR (2022)
Keyphrases
</>
web applications
data sources
end users
database
data processing
computer systems
business rules