Elsevier, Computers and Security, (70), p. 111-123
DOI: 10.1016/j.cose.2017.05.010
Export citation
Search in Google Scholar
Full text: Unavailable