Login / Signup

Detecting application logic vulnerabilities via finding incompatibility between application design and implementation.

Mahmoud GhorbanzadehHamid Reza Shahriari
Published in: IET Softw. (2020)
Keyphrases
  • data mining
  • case study
  • practical application
  • design methodology
  • design methodologies
  • data sets
  • multi agent
  • knowledge based systems
  • modular design