Similar Items: Implicit security requirements classification with large language models using the OWASP application security verification standard: a shift-left approach
- Less is more: usefulness of data flow diagrams and large language models for security threat validation
- Analisis Kerentanan Website SMK Muhammadiyah 2 Bontoala Makassar Menggunakan Metode OWASP (Open Web Application Security Project)
- The Need for Cloud Security in a Modern Business Environment
- The Secure GPS Tracking Data for transportation in Distributed Environments
- Investigating cross-market android apps: Security, protection, and components
- Cracking IoT security: can LLMs outsmart static analysis tools?