Abstract: The unauthorized access to information systems resources, for instants cyberattacks, can impact on its surrounding area, causing the certain anomalies. Mostly this area is not formalizing ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results