Elsevier, Journal of Information Security and Applications, (40), p. 193-198
DOI: 10.1016/j.jisa.2018.04.006
Export citation
Search in Google Scholar
Full text: Unavailable