Login / Signup
The Vulnerability Instantiation Methodology prototype.
Robin Barker
Gavin Kelly
Published in:
Inf. Secur. Tech. Rep. (1998)
Keyphrases
</>
test bed
risk assessment
database
neural network
computer vision
case study
multi agent systems