Return to Article Details Threat analysis of web-applications based on REST architecture Download Download PDF