Login / Signup
Manager Asks: Which Vulnerability Must be Eliminated First?
David Pecl
Yehor Safonov
Zdenek Martinasek
Matej Kacic
Lubomir Almer
Lukas Malina
Published in:
SECITC (2020)
Keyphrases
</>
management system
multiscale
databases
data structure
risk assessment
resource manager
database
neural network
search engine
decision trees
image segmentation
database systems
cooperative
buffer overflow
attack graphs