A model for security vulnerability pattern

Hyungwoo Kang*, Kibom Kim, Soonjwa Hong, Dong Hoon Lee

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)

    Fingerprint

    Dive into the research topics of 'A model for security vulnerability pattern'. Together they form a unique fingerprint.

    Computer Science

    Keyphrases