Springer, Journal of Hardware and Systems Security, 2(2), p. 162-178, 2018
DOI: 10.1007/s41635-018-0035-4
Export citation
Search in Google Scholar
Full text: Download