Elsevier, Computers and Security, (56), p. 140-150, 2016
DOI: 10.1016/j.cose.2015.06.006
Export citation
Search in Google Scholar
Full text: Unavailable