Login / Signup

A Comparative Study of Credentialed Vulnerability Scanning and Non-credentialed Vulnerability Scanning.

Anjie ChenZhibing Zhang
Published in: ISPA/BDCloud/SocialCom/SustainCom (2021)
Keyphrases
  • scan data
  • decision making
  • image processing
  • data sets
  • knowledge base
  • structured light
  • genetic algorithm
  • high level
  • face recognition
  • search algorithm
  • information technology
  • medical images
  • barcode
  • scanned images