Login / Signup

Automatic repair of OWASP Top 10 security vulnerabilities: A survey.

Alexander Marchand-MelsomDuong Bao Nguyen Mai
Published in: ICSE (Workshops) (2020)
Keyphrases
  • security vulnerabilities
  • intrusion detection
  • data mining
  • databases
  • low cost
  • anomaly detection
  • dos attacks
  • penetration testing