[1]
Anand, A., Bhatt, N., Kaur, J. and Tamura, Y. 2021. Time Lag-Based Modelling for Software Vulnerability Exploitation Process. Journal of Cyber Security and Mobility. 10, 4 (Jun. 2021), 663–678. DOI:https://doi.org/10.13052/jcsm2245-1439.1042.