Springer, Journal of Hardware and Systems Security, 3(3), p. 235-249, 2019
DOI: 10.1007/s41635-019-00071-z
Export citation
Search in Google Scholar
Full text: Unavailable