IOS Press, Journal of Computer Security, 6(23), p. 685-707, 2015
DOI: 10.3233/jcs-150531
Export citation
Search in Google Scholar
Full text: Download