Elsevier, Computers and Security, (45), p. 84-99
DOI: 10.1016/j.cose.2014.05.004
Export citation
Search in Google Scholar
Full text: Download