Elsevier, Computers and Security, (74), p. 277-295, 2018
DOI: 10.1016/j.cose.2017.10.006
Export citation
Search in Google Scholar
Full text: Unavailable