Mass assignment vulnerability

Known as: Mass assignment, Mass-assignment vulnerability 
Mass assignment is a computer vulnerability where an active record pattern in a web application is abused to modify data items that the user should… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1988-2017
024619882017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
The problem of multitarget tracking in clutter has been shown to be very challenging for both the measurement of track… (More)
  • table I
  • figure 1
  • figure 3
  • figure 2
  • figure 4
Is this relevant?
2012
2012
In this paper, we present a new method for data association in multi-target tracking. The representation and the fusion of the… (More)
  • table 1
  • table 2
  • figure 1
  • figure 2
  • figure 4
Is this relevant?
2008
2008
In this paper, we propose in Dezert-Smarandache Theory (DSmT) framework, a new probabilistic transformation, called DSmP, in… (More)
  • table II
  • table IV
  • table VIII
  • table IX
  • table VII
Is this relevant?
2007
2007
Herrera and Martinez initiated a 2-tuple fuzzy linguistic representation model for computing with words (CW), which offers a… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2007
2007
We present a novel sensor calibration methodology that is suited to an evidence theoretic unmanned ground vehicle (UGV… (More)
  • figure 1
  • table I
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2006
2006
The idea of describing imprecise information taking independently into account both positive and negative aspects lies in the… (More)
  • table I
  • table II
Is this relevant?
2005
2005
Recently, an attempt of integration between the theories of fuzzy sets and rough sets has resulted in providing a roughness… (More)
Is this relevant?
2001
2001
This paper is concerned with the use of Dempster-Shafer theory in ‘fusion’ classifiers. We argue that the use of predictive… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
1997
1997
 
Is this relevant?
1995
1995
This paper describes a database framework which is similar to a relational database in style but uses alternative knowledge… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?