Suchergebnisse - "exploitation detection"
-
1
Autoren:
Quelle: IEEE Access, Vol 11, Pp 52009-52025 (2023)
-
2
Autoren: et al.
Schlagwörter: Broken access control, Exploitation detection, Logical vulnerabilities, Survey paper, Web application security
Relation: https://zenodo.org/records/10460430; oai:zenodo.org:10460430
Full Text Finder
Nájsť tento článok vo Web of Science