An overview of vulnerability assessment and penetration testing techniques
Crossref DOI link: https://doi.org/10.1007/s11416-014-0231-x
Published Online: 2014-11-28
Published Print: 2015-02
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Shah, Sugandh
Mehtre, B. M.
Text and Data Mining valid from 2014-11-28