Inderscience, International Journal of Electronic Security and Digital Forensics, 4(2), p. 407
DOI: 10.1504/ijesdf.2009.027672
Export citation
Search in Google Scholar
Full text: Unavailable