Login / Signup
Detecting Vulnerable OAuth 2.0 Implementations in Android Applications.
Waris Damkham
Shingo Kunihiro
Songpon Teerakanok
Tetsutaro Uehara
Published in:
QRS Companion (2023)
Keyphrases
</>
automatic detection
efficient implementation
multi agent
data structure
relational databases
databases
search engine
case study
image sequences
reinforcement learning
cooperative
search algorithm
pattern recognition
preprocessing
evolutionary algorithm