Login / Signup

Analysis of Security Vulnerabilities Using Misuse Pattern Testing Approach.

Yifan YuanSomjai Boonsiri
Published in: J. Softw. (2015)
Keyphrases
  • data analysis
  • anomaly detection