Vulnerability analysis
dc.contributor.author | Rieck, Konrad | |
dc.date.accessioned | 2018-04-13T09:16:44Z | |
dc.date.available | 2018-04-13T09:16:44Z | |
dc.date.issued | 2017 | |
dc.identifier.doi | 10.1515/itit-2016-0059 | |
dc.identifier.pissn | 1611-2776 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/16401 | |
dc.language.iso | en | |
dc.publisher | De Gruyter | |
dc.relation.ispartof | it - Information Technology: Vol. 59, No. 5 | |
dc.title | Vulnerability analysis | en |
dc.type | Text/Journal Article | |
gi.citation.publisherPlace | Berlin | |
gi.citation.startPage | 57 | |
gi.conference.sessiontitle | Editorial |