Login / Signup
Detecting security vulnerabilities with vulnerability nets.
Pingyan Wang
Shaoying Liu
Ai Liu
Wen Jiang
Published in:
J. Syst. Softw. (2024)
Keyphrases
</>
security vulnerabilities
penetration testing
intrusion detection
dos attacks
security properties
attack graphs
unauthorized access
artificial intelligence
software engineering