Login / Signup

Automation of Post-exploitation - (Focused on MS-Windows Targets).

Mohammad Tabatabai IraniEdgar R. Weippl
Published in: FGIT-SecTech (2009)
Keyphrases
  • artificial intelligence
  • machine learning
  • database
  • neural network
  • website