2022
DOI: 10.26583/bit.2022.3.08
|View full text |Cite
|
Sign up to set email alerts
|

Methodological aspects of penetration testing automation for significant objects of critical information infrastructure

Help me understand this report

This publication either has no citations yet, or we are still processing them

Set email alert for when this publication receives citations?

See others like this or search for similar articles