Login / Signup

Creating a vulnerable node based on the vulnerability MS17-010.

Aleksey NovokhrestovAnton KalyakinAleksandr KovalenkoVladimir Repkin
Published in: CoRR (2024)
Keyphrases
  • security risks
  • cooperative
  • tree structure
  • data sets
  • neural network
  • machine learning
  • xml documents
  • computer networks
  • risk assessment
  • leaf nodes