Research output: Contribution to journal › Article › peer-review
64Downloads
(Pure)
Fingerprint
Dive into the research topics of 'Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases'. Together they form a unique fingerprint.