Login / Signup
Detecting Cyber Security Vulnerabilities through Reactive Programming.
Ole Christian Moholth
Radmila Juric
Karoline Moholth McClenaghan
Published in:
HICSS (2019)
Keyphrases
</>
security vulnerabilities
dos attacks
penetration testing
intrusion detection
security properties
artificial intelligence
data processing
third party
unauthorized access