Login / Signup

Web Application Weakness Ontology Based on Vulnerability Data.

Onyeka EzenwoyeYi Liu
Published in: CoRR (2022)
Keyphrases
  • web applications
  • data sources
  • end users
  • database
  • data processing
  • computer systems
  • business rules