Elsevier, Computers and Security, 4(25), p. 257-264, 2006
DOI: 10.1016/j.cose.2006.02.002
Export citation
Search in Google Scholar
Full text: Unavailable