Login / Signup

Router Penetration Testing Based on CEM Vulnerability Assessment Criteria.

Tai-Ying ChiuBor-Yao TsengBagus Tri AtmajaJiann-Liang ChenJian-Chang Hsu
Published in: ICACT (2024)
Keyphrases
  • penetration testing
  • security vulnerabilities
  • hardware and software
  • end to end
  • database
  • cross platform
  • management practices
  • data mining
  • information technology
  • risk assessment