Elsevier, Journal of Information Security and Applications, (48), p. 102374, 2019
DOI: 10.1016/j.jisa.2019.102374
Export citation
Search in Google Scholar
Full text: Unavailable