Author:
Mahmoud Qusay H.,Kauling Dylan,Zanin Shaun
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Defense-In-Depth Security Strategy in Log4j Vulnerability Analysis;2022 International Conference Advancement in Data Science, E-learning and Information Systems (ICADEIS);2022-11-23
2. Mitigating Remote Code Execution Vulnerabilities: A Study on Tomcat and Android Security Updates;2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS);2021-04-21
3. Quantitative Assessment of Remote Code Execution Vulnerability in Web Apps;Lecture Notes in Electrical Engineering;2020
4. PUREDroid;Proceedings of the 2019 3rd International Conference on Information System and Data Mining - ICISDM 2019;2019