Detecting security vulnerabilities with vulnerability nets.

Pingyan WangShaoying LiuAi LiuWen Jiang
Published in: J. Syst. Softw. (2024)
Keyphrases
  • security vulnerabilities
  • penetration testing
  • intrusion detection
  • dos attacks
  • security properties
  • attack graphs
  • unauthorized access
  • artificial intelligence
  • software engineering