The Plan and Tools for Vulnerability Testing in Information Software-Based System
Injung Kim, Younggyo Lee, Dongho Won, Journal of Information Processing Systems Vol. 1, No. 1, pp. 75-78, Dec. 2005

Keywords: Risk Analysis, Vulnerability, Asset, Threat
Fulltext:
Abstract
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[APA Style]
Injung Kim, Younggyo Lee, & Dongho Won (2005). The Plan and Tools for Vulnerability Testing in Information Software-Based System. Journal of Information Processing Systems, 1(1), 75-78. DOI: .
[IEEE Style]
I. Kim, and , "The Plan and Tools for Vulnerability Testing in Information Software-Based System," Journal of Information Processing Systems, vol. 1, no. 1, pp. 75-78, 2005. DOI: .
[ACM Style]
Injung Kim, Younggyo Lee, and Dongho Won. 2005. The Plan and Tools for Vulnerability Testing in Information Software-Based System. Journal of Information Processing Systems, 1, 1, (2005), 75-78. DOI: .