Login / Signup

A 2D-graph model-based heuristic approach to visual backtracking security vulnerabilities in physical protection systems.

Jun YangLeixiong HuangHaoming MaZhihui XuMing YangShaoqiang Guo
Published in: Int. J. Crit. Infrastructure Prot. (2022)
Keyphrases
  • security vulnerabilities
  • real world
  • distributed systems
  • computer systems
  • unsupervised learning
  • operating system