Search
Now showing items 1-1 of 1
A Remote Access Security Model based on Vulnerability Management
(Modern Education & Computer science Press, 2020)
Information security threats exploit vulnerabilities in communication networks. Remote access
vulnerabilities are evident from the point of communication initialization following the communication channel to data
or ...