Login / Signup
Vulnerability Assessment of OAuth Implementations in Android Applications.
Hui Wang
Yuanyuan Zhang
Juanru Li
Hui Liu
Wenbo Yang
Bodong Li
Dawu Gu
Published in:
ACSAC (2015)
Keyphrases
</>
risk assessment
assessment process
database
neural network
case study
efficient implementation
centered design
databases
knowledge base
database systems
artificial neural networks
user interface
medical images
automatic assessment
buffer overflow