From Security Equipment to Managing Vulnerabilities
Crossref DOI link: https://doi.org/10.1007/978-3-032-08784-3_1
Published Online: 2026-01-02
Published Print: 2026
Update policy: https://doi.org/10.1007/springer_crossmark_policy
EL Barhami, Yasmine https://orcid.org/0009-0006-3208-9160
Aroussi, Hatim Kharraz https://orcid.org/0009-0007-9834-7465
Text and Data Mining valid from 2026-01-01
Version of Record valid from 2026-01-01
Chapter History
First Online: 2 January 2026