Login / Signup
CVE Records of Known Exploited Vulnerabilities.
Jackson Lim
Yi Lin Lau
Leshawn Khin Ming Chan
Jia Ming Tristan Paul Goo
Huahua Zhang
Zhiyuan Zhang
Huaqun Guo
Published in:
ICCCS (2023)
Keyphrases
</>
information security
databases
record linkage
attribute values
database
collaborative virtual environments
real world
knowledge base
three dimensional
artificial neural networks
privacy preserving
medical data
countermeasures
data records
patient records
security vulnerabilities