Login / Signup
A quantitative evaluation of vulnerability scanning.
Hannes Holm
Teodor Sommestad
Jonas Almroth
Mats Persson
Published in:
Inf. Manag. Comput. Secur. (2011)
Keyphrases
</>
quantitative evaluation
ground truth
ground truth data
scan data
qualitative evaluation
risk assessment
error measure
brain mr images
structured light
image processing
quality assessment
neural network
high quality
image retrieval
buffer overflow