Return to Article Details
Modeling the vulnerabilities validation mechanism in the active analysis of the security of corporate networks using Bernstein polynomials
Download
Download PDF