Author:
Gawron Marian,Cheng Feng,Meinel Christoph
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Detection of Vulnerabilities in the Perimeter of the ICS Network Infrastructure Using TCP/IP Protocols;2023 International Russian Automation Conference (RusAutoCon);2023-09-10
2. V-Digger: An Efficient and Secure Vulnerability Assessment for Large-Scale ISP Network;IEEE Transactions on Dependable and Secure Computing;2023
3. Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations;Proceedings of the 17th International Conference on Availability, Reliability and Security;2022-08-23
4. Vulnerability Assessment of IoT Devices Through Multi-layer Keyword Matching;2021 International Conference on Computer, Internet of Things and Control Engineering (CITCE);2021-11
5. CPE and CVE based Technique for Software Security Risk Assessment;2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS);2021-09-22