مرور Volume 6, Issue 2 بر اساس عنوان
در حال نمایش موارد 1 - 2 از 2
-
BLProM: A black-box approach for detecting business-layer processes in the web applications
(University of Isfahan & Iranian Society of Cryptology, 2019-07-01)Web application vulnerability scanners cannot detect business logic vulnerabilities (vulnerabilities related to logic) because they are not able to understand the business logic of the web application. To identify the ...
-
Vol. 6, No. 2, 2019
(University of Isfahan & Iranian Society of Cryptology, 2019-07-01)Vol. 6, No. 2, 2019



