Vol-2121⫷ Vol-2122 ⫸Vol-2123
urn:nbn:de:0074-2122-0


Vol-2122/paper-2⫷Vol-2122/paper-3⫸Vol-2122/paper-4

Analysis of the Possibilities of Unauthorized Access in Content Management Systems Using Attack Trees