Login / Signup
Flow-Based Web Application Brute-Force Attack and Compromise Detection.
Rick Hofstede
Mattijs Jonker
Anna Sperotto
Aiko Pras
Published in:
J. Netw. Syst. Manag. (2017)
Keyphrases
</>
web applications
brute force
sql injection attacks
web browser
application development
end users
application developers
web services
computer chess
exhaustive search
computationally expensive
anomaly detection
web application development
flow diagram
countermeasures
sql injection
evolutionary algorithm