has been cited by the following article(s):
|
[1]
|
Asking Security Practitioners: Did You Find the Vulnerable (Mis)Configuration?
Proceedings of the 19th International Working Conference on Variability Modelling of Software-Intensive Systems,
2025
DOI:10.1145/3715340.3715439
|
|
|
|