Login / Signup
Do I really need all this work to find vulnerabilities?
Sarah Elder
Nusrat Zahan
Rui Shu
Monica Metro
Valeri Kozarev
Tim Menzies
Laurie A. Williams
Published in:
Empir. Softw. Eng. (2022)
Keyphrases
</>
information security
security vulnerabilities
countermeasures
security mechanisms
information retrieval
attack graph
security issues
video sequences
intrusion detection
data corruption
attack graphs
security flaws