"How to build a vulnerability benchmark to overcome cyber security attacks."

Junaid Akram, Ping Luo (2020)

Details and statistics

DOI: 10.1049/IET-IFS.2018.5647

access: closed

type: Journal Article

metadata version: 2023-08-28

a service of  Schloss Dagstuhl - Leibniz Center for Informatics