Article,

An overview of vulnerability assessment and penetration testing techniques.

, and .
J. Computer Virology and Hacking Techniques, 11 (1): 27-49 (2015)

Meta data

Tags

Users

  • @dblp

Comments and Reviews