Login / Signup
Router Penetration Testing Based on CEM Vulnerability Assessment Criteria.
Tai-Ying Chiu
Bor-Yao Tseng
Bagus Tri Atmaja
Jiann-Liang Chen
Jian-Chang Hsu
Published in:
ICACT (2024)
Keyphrases
</>
penetration testing
security vulnerabilities
hardware and software
end to end
database
cross platform
management practices
data mining
information technology
risk assessment