Login / Signup
An empirical study of tactical vulnerabilities.
Joanna C. S. Santos
Katy Tarrit
Adriana Sejfia
Mehdi Mirakhorli
Matthias Galster
Published in:
J. Syst. Softw. (2019)
Keyphrases
</>
security vulnerabilities
information security
neural network
countermeasures
information technology
real time strategy games
image processing
security issues
security risks
attack graph
attack graphs
database systems
reinforcement learning
data structure
access control
multimedia
security patterns
database