Login / Signup
A Comparative Study of Credentialed Vulnerability Scanning and Non-credentialed Vulnerability Scanning.
Anjie Chen
Zhibing Zhang
Published in:
ISPA/BDCloud/SocialCom/SustainCom (2021)
Keyphrases
</>
scan data
decision making
image processing
data sets
knowledge base
structured light
genetic algorithm
high level
face recognition
search algorithm
information technology
medical images
barcode
scanned images