Login / Signup
Using Real-world Bug Bounty Programs in Secure Coding Course: Experience Report.
Kamil Malinka
Anton Firc
Pavel Loutocký
Jakub Vostoupal
Andrej Kristofík
Frantisek Kasl
Published in:
ITiCSE (1) (2024)
Keyphrases
</>
real world
bug reports
coding scheme
wide range
secure manner
case study
source code
synthetic data
security requirements
data sets
computational complexity
cloud computing
software systems
user authentication
security level
cryptographic protocols
website