Login / Signup

The legal aspects of cybersecurity vulnerability disclosure: To the NIS 2 and beyond.

Jakub VostoupalVáclav StupkaJakub HarastaFrantisek KaslPavel LoutockýKamil Malinka
Published in: Comput. Law Secur. Rev. (2024)
Keyphrases
  • data quality
  • data protection
  • real time
  • neural network
  • search engine
  • information systems
  • proceedings of the th international conference
  • legal argument