z-logo
open-access-imgOpen Access
A method for classifying attack implementations based upon its primary objective
Author(s) -
Luke Edward Ryon
Publication year - 2020
Language(s) - English
Resource type - Dissertations/theses
DOI - 10.31274/rtd-20200817-54
Subject(s) - implementation , primary (astronomy) , computer science , data mining , programming language , physics , astronomy

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here