• A Remote Access Security Model based on Vulnerability Management 

      Samuel Ndichu, Sylvester McOyowo, and Henry Okoyo,Cyrus Wekesa (Modern Education & Computer science Press, 2020)
      Information security threats exploit vulnerabilities in communication networks. Remote access vulnerabilities are evident from the point of communication initialization following the communication channel to data or ...