Elsevier, Computers and Security, (83), p. 38-51, 2019
DOI: 10.1016/j.cose.2019.01.009
Export citation
Search in Google Scholar
Full text: Unavailable