Sign in
Automated penetration testing based on a threat model.
Norah Ahmed Almubairik
Gary B. Wills
Published in:
ICITST (2016)
Keyphrases
</>
case study
knowledge discovery
formal model