[1]
T. Bhuiyan, A. Begum, S. Rahman, and I. Hadid, “API vulnerabilities: current status and dependencies”, IJET, vol. 7, no. 2.3, pp. 9–13, Mar. 2018, doi: 10.14419/ijet.v7i2.3.9957.