Return to Article Details
Constructing a model for the dynamic evaluation of vulnerability in software based on public sources
Download
Download PDF