Zobrazeno 1 - 3
of 3
pro vyhledávání: '"threat lifecycle"'
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 29, Iss 1, Pp 150-159 (2021)
Software vulnerabilities are identified during their whole life-cycle; some vulnerabilities may be caused by flaws on the design while other appear due to advances on the technologies around the systems. Frameworks such as OWASP are well- known and a
Externí odkaz:
https://doaj.org/article/4f0c98507ba14155b8b1b84229cbf7a2
Publikováno v:
FRUCT
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 29, Iss 1, Pp 150-159 (2021)
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 29, Iss 1, Pp 150-159 (2021)
Software vulnerabilities are identified during their whole life-cycle; some vulnerabilities may be caused by flaws on the design while other appear due to advances on the technologies around the systems. Frameworks such as OWASP are well- known and a
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.