Sign in

Security Vulnerabilities Detection Through Assertion-Based Approach.

Salim Yahia KissiRabéa Ameur-BoulifaYassamine Seladji
Published in: TASE (2022)
Keyphrases
  • security vulnerabilities
  • intrusion detection
  • penetration testing
  • database
  • association rules
  • computer systems
  • unauthorized access