Login / Signup
Measuring and mitigating OAuth access token abuse by collusion networks.
Shehroze Farooqi
Fareed Zaffar
Nektarios Leontiadis
Zubair Shafiq
Published in:
Commun. ACM (2020)
Keyphrases
</>
social networks
database
network analysis
network structure
computer networks
random access
real world
multiscale
access control
complex systems
network design
multiple users
access points
telecommunication networks
high bandwidth