Elsevier, Computers and Security, (65), p. 314-328
DOI: 10.1016/j.cose.2016.10.010
Export citation
Search in Google Scholar
Full text: Unavailable