Skip to main content
. 2022 Nov 2;82(11):16951–16971. doi: 10.1007/s11042-022-14036-y

Fig. 1.

Fig. 1

Vulnerability exploitation of NIST database [15]