Elsevier, Computers and Security, (69), p. 114-126
DOI: 10.1016/j.cose.2016.11.014
Export citation
Search in Google Scholar
Full text: Unavailable