Skip to main content
. 2025 Jan 2;25(1):211. doi: 10.3390/s25010211

Figure 13.

Figure 13

Common vulnerabilities supported by the solution. (a) Vulnerabilities in the recommendation system. (b) Top vulnerabilities in the CVE dataset.