Vulnerability Management in IIoT-Based Systems: What, Why and How
Crossref DOI link: https://doi.org/10.1007/978-3-031-08270-2_3
Published Online: 2022-09-03
Published Print: 2022
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Yadav, Geeta
Paul, Kolin
Gauravaram, Praveen
Text and Data Mining valid from 2022-01-01
Version of Record valid from 2022-01-01
Chapter History
First Online: 3 September 2022