Sign in

Automated penetration testing based on a threat model.

Norah Ahmed AlmubairikGary B. Wills
Published in: ICITST (2016)
Keyphrases
  • case study
  • knowledge discovery
  • formal model