Return to Article Details Model of rules for malicious input parameters detection Download Download PDF