Login / Signup
Characterizing co-located insecure coding patterns in infrastructure as code scripts.
Farzana Ahamed Bhuiyan
Akond Rahman
Published in:
ASE Workshops (2020)
Keyphrases
</>
data mining techniques
error correcting
error control
coding scheme
code length
source code
coding method
authentication scheme
application programming interface
information exchange
logical operations