Two threat patterns that exploit "security misconfiguration" and "sensitive data exposure" vulnerabilities

Rohini Sulatycki, Eduardo B. Fernández. Two threat patterns that exploit "security misconfiguration" and "sensitive data exposure" vulnerabilities. In Claudius Link, Veli-Pekka Eloranta, editors, Proceedings of the 20th European Conference on Pattern Languages of Programs, EuroPLoP 2015, Kaufbeuren, Germany, July 8-12, 2015. ACM, 2015. [doi]

References

No references recorded for this publication.

Cited by

No citations of this publication recorded.