Login / Signup
Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks.
Nour Moustafa
Benjamin P. Turnbull
Kim-Kwang Raymond Choo
Published in:
ICII (2018)
Keyphrases
</>
network structure
network design
social networks
genetic algorithm
artificial intelligence
website
microarray
telecommunication networks
connectionist networks
identification rate