Computer and Cyber Security, p. 1-21, 2018
DOI: 10.1201/9780429424878-1
Export citation
Search in Google Scholar
Full text: Unavailable