Login / Signup
Evaluating vulnerability scanners using harmonised vulnerability categories.
H. S. Venter
Jan H. P. Eloff
Published in:
South Afr. Comput. J. (2003)
Keyphrases
</>
neural network
risk assessment
e learning
image features
range data
buffer overflow
penetration testing