IOS Press, Journal of Computer Security, 3(18), p. 451-473
DOI: 10.3233/jcs-2009-0374
Export citation
Search in Google Scholar
Full text: Unavailable