procedure
The researchers conducted remote semi-structured interviews with a subset of listing study participants to understand why specific factors and tooling are important and how they fit into current vulnerability management practices.

Authors

Sources

Referenced by nodes (1)