Abstract: This paper presents a modular approach to facilitate the design and creation of vulnerable testbed devices to perform penetration tests and generate data sets for future work on anomaly ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results