Logo des Repositoriums
 

Vulnerability analysis

dc.contributor.authorRieck, Konrad
dc.date.accessioned2018-04-13T09:16:44Z
dc.date.available2018-04-13T09:16:44Z
dc.date.issued2017
dc.identifier.doi10.1515/itit-2016-0059
dc.identifier.pissn1611-2776
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/16401
dc.language.isoen
dc.publisherDe Gruyter
dc.relation.ispartofit - Information Technology: Vol. 59, No. 5
dc.titleVulnerability analysisen
dc.typeText/Journal Article
gi.citation.publisherPlaceBerlin
gi.citation.startPage57
gi.conference.sessiontitleEditorial

Dateien