Login / Signup

Characterizing co-located insecure coding patterns in infrastructure as code scripts.

Farzana Ahamed BhuiyanAkond Rahman
Published in: ASE Workshops (2020)
Keyphrases
  • data mining techniques
  • error correcting
  • error control
  • coding scheme
  • code length
  • source code
  • coding method
  • authentication scheme
  • application programming interface
  • information exchange
  • logical operations