Modeling Vulnerable Internet of Things on SHODAN and CENSYS : An Ontology for Cyber Security

international conference on emerging security information systems and technologies(2016)

引用 23|浏览6
暂无评分
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要