Elsevier, Computers and Security, (48), p. 167-181, 2015
DOI: 10.1016/j.cose.2014.10.001
Export citation
Search in Google Scholar
Full text: Unavailable