Author:
Sharma Ruchi,Sibal Ritu,Sabharwal Sangeeta
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Software vulnerability prioritization using vulnerability description;International Journal of System Assurance Engineering and Management;2020-07-21
2. On interdisciplinarity between product adoption and vulnerability discovery modeling;International Journal of System Assurance Engineering and Management;2020-06-19