Login / Signup
Analysis of the Possibilities of Unauthorized Access in Content Management Systems Using Attack Trees.
Artem Tetskyi
Vyacheslav S. Kharchenko
Dmytro Uzun
Published in:
PhD@ICTERI (2018)
Keyphrases
</>
data structure
access control
computer systems
unauthorized access